a&s Middle East Qatar Edition

Page 1


Strengthening Digital Security and Global Collaboration

eCLIQ Your key to digital access

Life is easier when you just CLIQ®

Replace key bunches with one customizable, programmable key. Update mobile workers’ permissions via app. Trace every key use. Equip any access point. And never change your locks again.

eCLIQ makes your life easier. Scan the QR code to see how.

Experience a safer and more open world

As Qatar’s rapid digitization fuels its transformation, the nation faces rising cyber threats, with over 5.1 million attacks in 2022 alone, prompting the launch of the National Cyber Security Strategy 2024-2030 to solidify its position as a global leader in cybersecurity

52 HID Global

The Rise of Mobile Access: Transforming Physical Security in the Digital Age

54 Genetec

Genetec to showcase advanced physical security solutions at Milipol Qatar 2024

56 Trassir TRASSIR and Suprema Join Forces

Defense: How critical security upgrades are the unsung heroes in protecting against cyber-attacks

58 ASSA ABLOY Aperio: ASSA ABLOY Advanced wireless locking technology

Professional media for complete security solutions

Milipol Qatar 2024: Marking Our First Dedicated Qatar Edition EDITOR‘S WORD

Management

Mahir Hodžić, General Manager mahir.hodzic@asmideast.com

Adis Hodžić, CEO adis.hodzic@asmideast.com

Editorial Staff

Mahir Hodžić, Editor-in-Chief mahir.hodzic@asmideast.com

Orhan Hadžagić, Associate Editor orhan.hadzagic@asmideast.com

Emily Lin, Contributing Editor Emily.Lin@taiwan.messefrankfurt.com

Mirza Bahić, Journalist editorial@asmideast.com

Nermin Kabahija, Journalist editorial@asmideast.com

Art Staff

Sanel Palislamović, Art&Design Editor sanel.palislamovic@asmideast.com

Nelmedin Kolubara, DTP&Art Design dino.kolubara@asmideast.com

Sales Amar Pap, Business Development Manager amar.pap@asmideast.com

International Sales Israel Gogol, International Sales Director Israel.Gogol@taiwan.messefrankfurt.com

International Associates Qatar – Mirsad Selimović, mirsad@techman.qa

a&s Middle East offers the latest news and insights on video surveillance, access control, intrusion detection, fire alarm, mechanical protection, man guarding, cyber security, artificial intelligence, IoT, big data, smart homes and buildings, industrial automation, information, communication technology to Middle East region professional channel players.

a&s Middle East is part of the media network of the Messe Frankfurt Ltd – Taiwan Branch, which offers several media platforms — asmag.com and a&s magazines, published in English, traditional Chinese, and three other languages, providing the most comprehensive industry trends, product, and supply chain information. The total annual circulation is approximately 515,000 copies around the globe. a&s Middle East is published 6 times a year, Jan/Feb, March/ April, May/June, July/August, Sept/Oct, and Nov/Dec.

Payment Instructions

Annual subscriptions are payable in USD, EUR, or AED. Subscription inquiries per your request.

EUR: AE340400000653005131002

Account No. 0653005131002

USD: AE070400000653005131003

Account No. 0653005131003

AED: AE610400000653005131001

Account No. 0653005131001

Copyright Statement

© Copyright by Privus Agency Ltd. All rights reserved. Any republication, copying, redistribution, or reproduction of the magazine in any form, including electronic, without the prior written consent of the publisher, is prohibited. Advertisers are solely responsible for the content of advertising material. The publisher bears no responsibility regarding possible legal, patent, content, or brand disputes of the advertiser.

Legal Disclaimer

The information in this magazine has not undergone any formal testing by Privus Agency Ltd. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While this information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments.

Corporate Address

Privus Agency FZ-LLC

JT010006, Al Shohada Road, Ras Al Khaimah, UAE

Tel: +971 58 983 4258

Web: www.asmideast.com

Marketing: marketing@asmideast.com

We are excited to announce the launch of the first-ever a&s Middle East Qatar Edition, marking a new chapter for our publication. From now on, we plan to continue this dedicated Qatar-focused edition, reflecting our commitment to providing the most relevant and timely insights into the region’s security landscape. Milipol Qatar 2024, held from October 29 to 31 at the Doha Exhibition and Convention Center (DECC), serves as the perfect platform for our inaugural issue. As the Middle East’s leading event for homeland security and civil defense, it brings together key decision-makers and industry leaders to showcase cuttingedge technologies and discuss pressing security challenges.

A key highlight of this edition is Qatar’s launch of its National Cybersecurity Strategy 2024-2030. This comprehensive initiative, aligned with Qatar National Vision 2030, sets a new benchmark for digital resilience and innovation in the region. Our special story covers this ambitious strategy in depth, exploring its goals to enhance cybersecurity, foster international cooperation, and drive technological advancement.

We invite you to join us at Milipol Qatar 2024 and explore the latest trends shaping the future of security in Qatar and beyond. Stay tuned as a&s Middle East Qatar Edition continues to provide exclusive insights and updates on the region’s evolving security environment.

Alongside our coverage of Milipol Qatar 2024, we feature insightful interviews with industry leaders and experts, providing their perspectives on the latest trends and developments in the security sector. Additionally, our product news section showcases cutting-edge technologies and solutions shaping the future of safety, from advanced surveillance systems to innovative cybersecurity tools. We invite you to explore these stories and stay informed on the dynamic advancements within the industry.

Please visit our official website www.asmideast.com and select ‘Subscribe Now’ option under THE MAGAZINE menu.

Subscription includes all six editions.

Digital edition is FREE and readily available at the official website.

Mahir Hodžić, General Manager

NATIONAL QATAR CYBER SECURITY STRATEGY 2024-2030 INTRODUCED

The National Cyber Security Agency launched the National Cyber Security Strategy 2024-2030 today under the patronage of HE Sheikh Mohammed bin Abdulrahman bin Jassim Al Thani, Prime Minister and Minister of Foreign Affairs. The ceremony was attended by several ministers and senior officials.

Aligned with the Qatar National Vision 2030, the comprehensive strategy aims to establish Qatar as a global leader in cybersecurity and a pioneer in the safe use of emerging technologies.

Speaking on this occasion, HE Abdulrahman bin Ali Al Farahid Al Malki, President of the National Cyber Security Agency, emphasised that cybersecurity can only be achieved through the collective efforts of government, private and other relevant entities.

The Second National Cyber Security Strategy’s slogan and vision, he explained, reflect our concerted efforts to foster trust in the cyberspace. This approach aims to ensure Qatar’s sus-

tainable technological progress and prosperity while strengthening the country’s cybersecurity ecosystem, he added.

To develop the strategy, the agency adopted an inclusive approach, actively coordinating with partners and their working groups, who were simultaneously tasked with preparing the Third National Development Strategy 20242030. These extensive collaborations were built to ensure seamless integration and alignment among various national entities, working in tandem to achieve the Qatar National Vision 2030, said HE Al Malki.

The National Cyber Security Strategy 2024-2030 is founded on core values, including shared responsibility, a risk management-based approach, a results-oriented focus, protection of individuals’ personal rights, economic prosperity, alignment and cooperation. The President of the National Cyber Security highlighted that these principles are fundamental to creating a strong national cybersecurity eco-

system and play a vital role in guiding the strategy’s effective implementation. n

QATAR’S NCSA PARTNERS WITH UK GOVERNMENT AND CREST TO STRENGTHEN GLOBAL CYBERSECURITY

The National Cyber Security Agency (NCSA) of Qatar has joined forces with the UK Government and CREST

to become a founding member of CREST Cyber Acceleration, a key initiative aimed at enhancing global cy-

bersecurity capabilities. This collaboration is focused on improving cybersecurity standards and sharing best practices in security assessments, threat detection, and overall risk management. By partnering with international organizations, NCSA aims to bolster Qatar’s national cybersecurity infrastructure while contributing to global cybersecurity resilience. This initiative is particularly important in addressing the growing cyber threats that affect both the public and private sectors, enabling organizations to better prepare and respond to these challenges. CREST, an international not-for-profit organization, brings a wealth of expertise in cybersecurity testing and certifications, further enriching this partnership. n

EXPERTS EXPLORE ROLE OF AI IN HEALTHCARE SIMULATION EDUCATION

Experts at the 4th Healthcare Simulation Conference in Doha have delved into the transformative potential of Artificial Intelligence (AI) in healthcare simulation and education. This gathering, featuring global professionals, highlighted how AI is reshaping medical training and patient care through enhanced simulation tools. These AI-driven simulations allow medical practitioners to engage in more precise, realtime decision-making processes in a riskfree environment.

The conference, organized by Hamad Medical Corporation (HMC), emphasized AI’s critical role in improving medical simulations by enhancing the realism and complexity of clinical scenarios. This allows medical professionals to hone their skills in a more dynamic and adaptable setting, which is crucial in preparing them for real-life medical challenges. Speakers also explored AI’s potential to provide personalized learning experiences and assessments for medical trainees, thereby addressing the individual needs of each student.

Experts discussed AI’s ability to generate more sophisticated data analyses and predictive models that can lead to earlier diagnosis and better patient outcomes. This is particularly relevant in training future healthcare providers, as it enhances their ability to

manage complex medical conditions. The conference not only focused on technological advancements but also addressed ethical concerns and the importance of ensuring human oversight in AIassisted healthcare. n

UAEU LAUNCHES ARTIFICIAL INTELLIGENCE AGENDA 2025-2031

The United Arab Emirates University (UAEU) has launched its Artificial Intelligence Agenda 2025-2031 to enhance its academic and research programmes.

The launch event was attended by Zaki Anwar Nusseibeh, Cultural Advisor to the UAE President and Chancellor of the UAEU, alongside several academic and administrative personnel, and faculty members.

In his speech, Nusseibeh said that the launch of UAEU’s AI Agenda coincides with the UAE Cabinet’s adoption of the UAE’s position on AI policy at the international level.

“This significant step reflects our unwavering commitment to enhancing the university’s status as a leading institution in higher education, research, and community service, while also embracing modern technologies,” he noted.

He further emphasised that UAEU will continue to lead as a top educational institution, striving to equip the next generation with the necessary technical and technological skills to positively impact society and the world.

The Chancellor explained that the wise leadership is at the forefront of anticipating the future, placing the UAE among the leading nations in the field of AI. This has been achieved through the implementation of several integrated strategies and initiatives, including the

UAE’s National Strategy for Artificial Intelligence, the first major project within the UAE Centennial 2071 plan, the appointment of the world’s first Minister of AI and the creation of an environment that fosters innovation in advanced technologies. n

SAUDI ARABIA LAUNCHES SAMAI INITIATIVE TO EMPOWER 1 MILLION CITIZENS IN AI

Minister of Education Yousef bin Abdullah Al-Benyan and Saudi Data and AI Authority (SDAIA) President Abdullah bin Sharaf Alghamdi launched the “One Million Saudi in AI” initiative, aiming to empower 1 million Saudis in artificial intelligence (AI).The initiative was launched in collaboration with the Ministry of Human Resources and Social Development during the third Global AI Summit (GAIN Summit 2024), held at the King Abdulaziz International Convention Center in Riyadh.The national initiative, the largest of its kind in the Kingdom, aims to empower a million Saudis to interact with a world led by AI, ensuring the building of a better future that enhances human capabilities. It will allow a million male and female citizens to understand AI, its uses, ethics, and to train on the skills and tools necessary to integrate AI into business and daily life effectively and safely.The SAMAI initiative constitutes a significant strategic step towards de-

veloping human capital in Saudi Arabia, achieving the aspirations of the leader-

ship for the Kingdom to become a global leader in technology and innovation. n

DUBAI ELECTRONIC SECURITY CENTER RECOGNIZED IN WEF REPORT FOR CYBERSECURITY TALENT INITIATIVES

The Dubai Electronic Security Center (DESC) has been praised in the World Economic Forum’s (WEF) latest Cybersecurity Talent Framework report for its significant efforts in bolstering the global cybersecurity workforce. Key initiatives, such as the Dubai Cyber Innovation Park

and the Cyber Security Competency Framework (Qudraat), were highlighted for their role in empowering the next generation of cybersecurity professionals.

DESC’s contribution aligns with ongoing international collaborations aimed at ad-

dressing the growing global cybersecurity talent shortage, which is estimated at 4 million professionals. The WEF acknowledged Dubai’s efforts, led by Dr. Bushra AlBlooshi, in fostering essential cybersecurity skills, enhancing workforce diversity, and improving the understanding of cybersecurity roles.

Hamad Obaid Al Mansoori, DirectorGeneral of Digital Dubai, emphasized that these international partnerships enhance Dubai’s reputation as a hub for technological innovation and talent development. This recognition is part of Dubai’s broader mission to establish itself as a global leader in cybersecurity, ensuring a secure digital environment. Through these initiatives, DESC is positioning Dubai as one of the safest cities in cyberspace, nurturing young talents with essential skills in the field and contributing to the global effort to tackle cybersecurity challenges.

For further details, the full report can be accessed on the WEF website. n

Your iPhone is Now Your Employee Badge.

With employee badge in Apple Wallet, staff and visitors can open office doors, access laptops, elevators, secure printers and much more using just their iPhone or Apple Watch. It’s another way HID is enabling secure, convenient workplace access.

Get started with employee badge in Apple Wallet at: hidglobal.com/applewallet

INCREASING APPETITE FOR ELECTRONIC HOME LOCKS TO DRIVE SALES TO $5.6 B BY 2030

The global electronic home locks market size is expected to reach USD 5.68 billion by 2030, registering to grow at a CAGR of 8.1% from 2024 to 2030 according to a new report by Grand View Research, Inc. High demand for home automation and advanced security technologies, such as electronics home locks, is expected to be the key factors driving the market. Rising construction activities in developed countries including U.S., Germany, U.K., and France are also expected to assist in growth of this market.

Moreover, integration of innovative technologies, such as Near-Field Communication (NFC), Bluetooth, and voice and face recognition, is expected to boost the product demand. North America was the dominant regional market in 2018 and is estimated to retain its leading position throughout the forecast period.

The growth is attributed to the rapid expansion of the construction industry, especially in residential sector, in the region. How-

ever, Asia Pacific is projected to witness the fastest growth over the forecast period due to high demand for advanced security solutions. The product demand is driven by the increasing residential construction activities, the trend of home automation, and disposable income levels in the region.

In addition, a rising number of branded retail outlets, especially in India and China, is anticipated to contribute to the market in growth. The keypad segment held the largest market revenue share of 45.8% in 2023, although the biometrics segment is beginning to show movement. n

KING ABDULAZIZ UNIVERSITY LAUNCHES PIONEERING AI PROGRAM IN EDUCATION AND RESEARCH

King Abdulaziz University has initiated a groundbreaking program focused on the integration of artificial intelligence (AI) in education and scientific research, marking the first of its kind among Saudi universities. This innovative program is designed to provide participants with in-depth knowledge of applying AI in areas such as data analysis, leadership, and management. The initiative aims to develop a clear vision and set strategic goals, policies, and future perspectives to align the educational and research processes with ongoing technological advancements.

Dr. Amin Yousef Noaman, Vice President for Graduate Studies and Scientific Research at King Abdulaziz University, underscored the vital role of AI in enhancing the learning experience and addressing the evolving demands of the job market. He emphasized that by equipping students with AI competencies, the university is helping them secure appropriate employment opportunities post-graduation. The program reflects the university’s dedication to re -

maining at the forefront of educational innovation by continually responding to emerging needs.

Spanning an entire semester, the program includes 50 hours of intensive training and 30 hours of assignments.

The sessions are led by a team of expert faculty members from the university, ensuring that students are well-prepared to effectively incorporate these advanced technologies into their academic and research work. n

Download the new Aperio Brochure to learn more about Aperio Products.

Upgrade any access system wirelessly or install wireless locks from scratch

Aperio H100 Electronic Handle

• Minimal door alterations

• A stylish handle in your door

• Achieve energy efficiency

Hall 5, Booth D-24 with ALKURDI trading and contracting company

IRIS ID’S BIOMETRICS ARE SECOND ONLY TO DNA IN ACCURACY

In an exclusive interview with a&s Middle East, Mohammed Murad, Vice President of Global Sales and Business Development at Iris ID, talks about his company’s pioneering technologies, the fusion of face and iris biometrics, and their global impact on security technology

a&s Middle East: Can you tell us about your career journey and how you came to your current role at Iris ID?

Murad: After finishing at The College of New Jersey with a degree in Computer Science and Mathematics, I started my career in development and integration. After a few years of experience, I joined an organization to provide post-sales system consulting which led me to try my knowledge in presales consulting to help sales and business development teams achieve their targets. That prepared me to run the global business at Iris ID. Since 2002 my journey at Iris ID has been amazing, it has been a very fulfilling experience and still going strong. Now Iris ID is a globally known brand in the iris biometrics space.

a&s Middle East: What are your main responsibilities as the Vice President of Global Sales and Business Development?

Murad: I manage Iris ID global product marketing, business development, sales, and NJ operations.

a&s Middle East: IRIS ID has a long history in iris recognition technology. Could you share some key milestones in the company’s development?

Murad: There have been many firsts at Iris ID. We were the first to really commercialize iris recognition solutions for our customers to enhance their security infrastructure. Iris ID was the first to implement and support an iris image standard and a driving force to get it adopted across the industry. We were the first to utilize iris recognition in securing the borders in Europe and the Middle East. We were able to help the world’s largest democracy enroll 1.4 billion people so they can uplift their citizens’ lifestyles and provide much-needed services. We implemented the concept of fusing the most convenient biometric, face, and the most accurate biometric iris, into one solution. We implemented our biometric solutions into an Android device and allowed our ecosystem partners to develop, build apps, and deliver robust cutting-edge innovations. These have been the defining moments for Iris ID and iris recognition.

a&s Middle East: Can you provide an overview of the latest products and technologies that IRIS ID has introduced?

Murad: Since the end of the pandemic, we have been very busy developing products that allow our partners to build solutions that can utilize non-contact biometrics to enhance the customer experience. These new products expanded our product portfolio and extended our biometric solution by combining face and iris as a fused biometric modality. All our current products iCAM D2000, iBAR600, iT100, and iA1000 use the convenience of face biometrics and the accuracy of iris recogni-

tion to deliver an exceptional user interface. We are now focusing on building our app partner ecosystem so they can provide apps for virtually every vertical market. The key to our future success is developing solutions that fit each individual customer and are not one-size-fits-all. Later this year we will be launching a cloud-based data collection service, “iTMS Cloud,” that will interface with popular Human Resource Management systems like UKG and SAP SuccessFactors.

a&s Middle East: How do you see the current landscape of biometric technology, especially in comparison to other modalities like fingerprint and facial recognition?

Murad: These are exciting times in the biometric industry where there are numerous innovations. All our industry colleagues are focusing on making biometric technologies simple to use and deliver fast ROI. As I mentioned earlier, we have adopted the most convenient biometric (face) and fused it with the most accurate biometric and made it so simple. Using iris recognition technology is as easy as looking towards the device for a second to complete the identification process. We believe all forms of biometrics are required at a particular time. In the USA, the FBI has indicated the finger for forensic, the face for investigative, and the iris for identification. With this approach, we can deliver strong authentication solutions for National ID, enterprise access control/time attendance, secure border crossing, transactions at ATM, and much more.

a&s Middle East: What are the key advantages of iris recognition technology over other biometric systems?

Murad: The Iris biometric is non-contact, fast, and accurate. The key advantage is its accuracy. Second only to DNA, iris recognition is the most accurate biometric. It captures over 240 degrees of freedom, or unique characteristics, used to formulate each iris’ algorithmic template. Furthermore, iris biometrics maintain accuracy whereas other biometrics do not. Examples include the fact that the technology works when the user is wearing goggles or masks, face shields, hazmat suits, PPE, or dressed in full cultural clothing such as a hijab or burqa. Authentication will still work no matter if the user has changed their physical appearance. Iris technology is also unique in that twins do not share the same iris nor can irises be rubbed off. In fact, even blind people qualify to use iris technology. The technology works regardless of race or culture and is totally bias-free.

a&s Middle East: How do you address the concerns related to the use of facial recognition technology for security and law enforcement applications?

Murad: It is always a good idea to have multiple forms of identity verification and authentication, especially in sensitive use cases such as law enforcement and security. Using a face

biometric can be used for investigative purposes followed by an iris biometric for positive identification. It is important to emphasize that the use of biometrics should be opt-in. We have many customers that obtain their users’ consent so they can use iris biometrics for internal identification purposes.

a&s Middle East: What are the specific advantages of using iris recognition in multi-factor authentication environments?

Murad: Using iris recognition as part of an MFA (multi-factor authentication) is smart when implementing security protocol. When used with traditional security tools such as pins and passwords, biometrics adds an extra layer of security that cannot be compromised. In particular, iris technology offers superior anti-spoofing. Encrypted iris recognition templates cannot be re-engineered which prevents fraudulent activity and identity theft. Additionally, Iris ID-generated templates have a very small footprint that allows these templates to be stored on a smart card to create a distributed database to comply with GDPR. This is a great solution for multi-factor authentication, as the person possessing the smart card must be present to gain access.

Iris ID was the first to implement and support an iris image standard and a driving force to get it adopted across the industry

a&s Middle East: Can you elaborate on how iris recognition technology manages to avoid false positives, even among identical twins?

Murad: Iris technology is the only data-rich biometric that is based on pattern recognition or a pattern-matching methodology. We take pictures of the eye just like a camera. The image capture process does not require any complex method and the process is safe and secure. Once the image is captured, an algorithm analyzes the pictures, and it is converted into a 512-byte digital template. It is not possible to convert the iris template to iris images once the template is created. This data is stored in a database as a series of 0’s and 1’s and is communicated to a control unit associated with the biometric device; identity is confirmed or denied. Because the data is not tied to any other personally identifying information (PII), should there be a data breach, individuals would not be able to be identified. Regarding twins, although they share the same DNA and may have similar faces that could possibly fool facial recognition systems, they do not share the same iris patterns. Furthermore, everyone, even twins have different iris patterns among the right and left eyes.

a&s Middle East: How does the enrollment process for iris recognition work, and what makes it user-friendly?

Murad: It is a very simple process. A subject approaches the device that is activated by proximity sensors to start taking pictures. The entire process takes less than 2 seconds to identify an individual in very large populations. We have spent a tremendous amount of time and resources conducting research

in developing a unique user interface with mirrors and other everyday-use products. The goal is to deliver a simple user interface with a best-in-class experience.

a&s Middle East: How does IRIS ID approach innovation and staying at the forefront of biometric technology?

Murad: We spend a lot of time listening to our customers and our R&D engineers take that feedback and apply it to each new concept. We then take new concepts back to our customers for validation. This enables us to enhance the user experience. Throughout the year, Iris ID actively participates in tradeshows and conferences to learn about the market and what customers need and want. Over the past 25 years, these activities have informed us of market trends. Additionally, I sit on the IBIA board whose mission is to advocate and educate about the responsible adoption of technology as it relates to managing identity, privacy, and security for individuals, organizations, and governments.

a&s Middle East: Could you discuss some unique applications of iris recognition technology in different sectors such as healthcare, law enforcement, and finance?

Murad: We have a global deployment of the technology. Iris ID is proud to say we have the who’s who on our customer list. Our technology is used to protect information in Fortune 100 companies globally. Our systems are integrated with multiple access control systems on an enterprise level. Many law enforcement agencies globally use Iris ID solutions to identify individuals. In 2020, the FBI’s NGI Iris Service was made fully operational and is most used today for the identification and validation of individuals entering and exiting correctional facilities where identity mix-ups are the root cause for many prison escapes in the U.S. Iris ID’s solutions are used to identify individuals at border crossing, enable them to vote, receive healthcare services, perform financial transactions and more.

a&s Middle East: How does iris recognition technology handle anti-spoofing, and what measures are in place to prevent identity theft?

Murad: Iris ID has implemented a liveness detection algorithm to analyze data and verify that the source is indeed a real human. There is a new name for anti-spoofing which is also an ISO standard, “Presentation Attach Detection” (PAD). We have unique technology to avoid any sort of attack. We are always striving to stay ahead of the bad guys.

a&s Middle East: How does IRIS ID address concerns related to privacy and data security in biometric systems?

Murad: As a company, Iris ID has high standards for itself, vendors, and customers who purchase and use our products. We make it clear that we are solely a solutions provider. At no time do we have access to, receive, or hold any biometric information. We expect that our customers will provide notice and receive consent from participating clients, but we do not have access to those details. We have published our biometric privacy statement at Privacy - Iris ID. I encourage you to visit our website and read our privacy policy https://www.irisid.com/privacy/

a&s Middle East: Can you explain the measures IRIS ID takes to prevent misuse of biometric data and ensure user privacy?

Murad: As mentioned earlier we take privacy and presentation attacks very seriously; we spend a lot of resources to make sure we are protecting our technology from any misuse.

a&s Middle East: What are the current trends in the biometrics industry that you find most exciting or promising?

Murad: Trends are pointing towards easy-to-use biometric solutions with customers agreeing to use biometrics to receive

an enhanced user experience. Technology is part of everyday use applications from accessing buildings, performing a banking transaction on a mobile phone to entering the gym. We see the ubiquitous use of biometric technologies.

a&s Middle East: How is IRIS ID addressing the unique security and biometric needs in the Middle Eastern market?

Murad: We have a long history of providing iris recognition solutions in the Middle East. Biometric adoption within this region is expected to continue to grow. As you cross the region from Dubai, Doha, or Saudi I am sure you have come in contact with Iris ID solutions to provide a seamless process of identification at the border. We are always working to form new partnerships and communicate the company’s capabilities. We are currently involved in several major projects in the region from data center security to managing organizations’ time & attendance capabilities and many other solutions.

Our technology works when the user is wearing goggles or masks, face shields, hazmat suits, PPE, or dressed in full cultural clothing such as a hijab or burqa

a&s Middle East: You recently entered into a partnership with Arena in Turkey. Can you share any significant partnerships or projects that IRIS ID has undertaken in the Middle East, and how these have impacted the region’s security landscape?

Iris ID is excited to announce a new strategic partnership with Arena to distribute its cutting-edge multi-model iris and facial recognition products in the Turkish regional market. This collaboration aims to leverage Arena’s extensive network of partners to enhance accessibility to iris recognition solutions across many diverse industries. Customers can now access Iris ID’s innovative products through Arena’s distribution channels, empowering businesses to enhance security and efficiency. Arena has more than 5,000 business partners spread across every town in Turkey since 1991.

a&s Middle East: What are your predictions for the future of biometric technology and its integration into everyday life?

The future for biometric technologies is bright. We have already seen the intersection of biometrics in our daily life and it will continue to accelerate.

a&s Middle East: What are the next key goals for IRIS ID in terms of product development and market expansion?

Iris ID wants to focus on developing products that are frictionless, easy-to-use solutions and allow our ecosystem partners to develop apps that satisfy our customer’s need for identity solutions. Our new product roadmap is full. Keep an eye out for our announcement on some exciting new technologies coming out in the coming year. n

Faisal Mohamed, ScreenCheck

DRIVING SAUDI ARABIA’S

2030 WITH RFID AND AI-POWERED ACCESS CONTROL SOLUTIONS

Faisal Mohamed, Chief Executive Officer of ScreenCheck Middle East, discusses the company’s role in advancing Saudi Arabia’s security infrastructure, its innovative cloud-based access solutions, and the integration of RFID and AI technologies to support Vision 2030.

a&s Middle East: Can you provide an overview of ScreenCheck’s business model and its full range of solutions, from hardware to software and services?

Mohamed: ScreenCheck is a prominent value-added distributor in the region, focused on providing products and solutions in security and identification, including access control systems, turnstiles, barriers, attendance management, RFID tracking, video surveillance, visitor management, and ID card issuance. Our suite also covers meeting room management, energy management, and vehicle recognition technologies. As a value-added distributor, we provide additional services such as site surveys, testing, and commissioning when our partners need them. We specialize in tailoring and integrating these systems to meet each customer’s unique needs, providing a converged security platform.

a&s Middle East: How has ScreenCheck’s 20 years of global experience in the security and identification industry helped it become the market leader in Saudi Arabia in such a short time?

Mohamed: With more than two decades of experience working with a diverse range of partners and clients across various geographies, we have developed deep industry insights that help us stay ahead of trends and fill market gaps. This background allows us to quickly understand the gaps in the Saudi market within our industry and offer solutions to our partners that are well-received. The new partnerships we have signed with manufacturers for the Saudi Arabian territory are a testament to our quick market penetration and increasing market share. Thanks to all our partners who have trusted our strengths. To maintain this leadership, we continuously introduce new products and solutions with innovative technologies that address evolving customer needs and demands. Essentially, our extensive experience drives us to exceed expectations by adopting the latest in products and solutions.

a&s Middle East: How is ScreenCheck supporting Saudi Arabia’s technological advancement?

Mohamed: We are bringing top global security and identification technologies to Saudi Arabia. By partnering with leading international brands, we offer advanced solutions tailored to local needs. We were one of the first to introduce mobile-based, 100% cloud access control to the region. We work on many local projects, integrating multiple solutions to meet specific requirements. The Saudi Arabian market is quick to adopt the latest global technologies and implement them in its environment. For example, we recently provided a solution to one of the prominent data centers, where RFID technology is used for real-time visibility of visitors and staff in the data center. One of the largest mosques uses

We were one of the first to introduce mobile-based, 100% cloud access control to the region

IoT technology to track and monitor the conditions of its carpets. Our goal is to adapt these technologies to fit seamlessly into the Saudi market and support the country’s technological progress. Any big project you take on in the region, you will find a footprint of ScreenCheck in it.

a&s Middle East: What specific industries in Saudi Arabia benefit the most from ScreenCheck’s RFID and AI technologies?

Mohamed: In general, our products and solutions fit into all industries. However, industries such as healthcare, hospitality, government, data centers, and manufacturing reap significant benefits from our RFID and AI technologies. These sectors require precise tracking, high security, and efficient operations, making our solutions ideal for access control, asset management, and data protection.

Our mobile-based access solutions enhance security and convenience by eliminating the need for physical cards

a&s Middle East: How is ScreenCheck contributing to Saudi Arabia’s Vision 2030 goals?

Mohamed: Smart Cities are one of the key goals of Vision 2030. We bring technologies and solutions in automation, the Internet of Things (IoT), and Artificial Intelligence (AI), which are important factors in Smart City development. We have contributed to various projects by providing AI-based access control, video analytics, and track-and-trace IoT solutions in Saudi Arabia, and we are seeing a surge in demand for such solutions as customers recognize the added value and the need to stay up-to-date with available technologies.

a&s Middle East: How is security convergence shaping the industry, and how is ScreenCheck helping organizations adapt to this trend?

Mohamed: Security convergence involves integrating physical and cybersecurity into a unified strategy. Interestingly, we are leading this shift by offering solutions that combine multi-factor authentication, encryption, and cloud-based management. This integration allows organizations to manage both physical and digital security seamlessly, improving overall protection and incident management.

a&s Middle East: What inspired the development of the Digital ID feature, and how do you see it impacting the future of identification systems?

Mohamed: The development of the Digital ID feature was driven by the need for more secure, convenient identification in today’s world. Today, customers do not want to carry traditional ID or access cards. Our mobile-based access solutions enhance security and convenience by eliminating the need for physical cards.

Any big project you take on in the region, you will find a footprint of ScreenCheck in it

As Digital ID evolves, it will play a crucial role in modern identification systems, offering scalable and secure solutions.

a&s Middle East: How does ScreenCheck ensure data security and privacy in its cloud-based solution, particularly for asset tracking and people visibility with RFID?

Mohamed: We ensure robust data security by implementing advanced encryption protocols, secure communication channels, and multi-factor authentication. Continuous monitoring and regular updates protect against threats, securing both asset and people visibility data. At Intersec Saudi, we will showcase a new range of controllers that adhere to the highest cybersecurity standards and comply with the requirements of the NIS2 EU Directive. These measures will significantly boost building security, ensuring privacy and preventing unauthorized access.

a&s Middle East: What are the main challenges you have encountered in adapting your products for various industries like education, healthcare, and government?

Mohamed: Adapting products for education, healthcare, and government involves addressing unique challenges such as privacy regulations, high-security data control, and dynamic needs. Our customized approach leverages deep industry knowledge to meet specific standards and ensure compliance, providing tailored solutions that enhance security and efficiency.

a&s Middle East: How does ScreenCheck stay ahead of technological advancements in the security and identification industry?

Mohamed: We stay ahead by forming strategic partnerships with leading global brands and integrating the latest technologies

into our solutions. Our extensive market coverage across 35+ countries keeps us informed about emerging trends. By continually updating our offerings, we ensure that our solutions remain at the forefront of the industry.

a&s Middle East: What role do you see mobile identification playing in the future, and how is ScreenCheck positioning itself in this space?

Mohamed: Mobile identification is set to become a key part of future security systems, offering enhanced convenience and flexibility. We were among the first to introduce mobile-based access control in the region. This technology simplifies access while maintaining high security through advanced encryption. As mobile identification evolves, it will increasingly offer a secure, efficient alternative to traditional methods. Today, we offer multiple models in mobile-based access control solutions, including 100% cloud and on-premise deployment.

a&s Middle East: What are your plans for expanding ScreenCheck’s market presence in the Middle East and beyond?

Mohamed: We are expanding by partnering with world-leading brands and introducing innovative solutions tailored for the Middle East and Africa. In simple terms, our strategy involves enhancing our market presence with new technologies and products that address security concerns in a fast-changing market. We have already established partnerships with more than 500 partners in the Middle East and Africa, and the plan is to add even more innovative brands and products to the portfolio. We are currently working on expanding into Southeast Asian countries, which is a promising market. n

GlobalEventforHomelandSecurity&Sa

Datapath

ANYTHING,

ANYWHERE, WITH COMPLETE CONTENT CONTROL IS OUR VISION FOR MODERN CONTROL ROOMS

In a revealing exchange with a&s Middle East, Steve Simpson, Regional Sales Manager at Datapath, delves into the company’s four-decade journey in visual control technologies, highlighting their innovative solutions, advancements in AV-over-IP, and strategies for addressing the unique challenges and opportunities in the Middle Eastern market

a&s Middle East: Can you please present yourself to our readers?

Simpson: Steve Simpson, Regional Sales Manager, Datapath (Middle East). I have lived and worked in Dubai and the surrounding region for over 20 years.

a&s Middle East: Can you provide a brief overview of Datapath and its core business areas?

Simpson: Datapath is a world leader in control technologies for creative multidisplay video walls, small- to mediumscale video walls in enterprise collaboration environments, and command and control room video walls of any scale. Founded in 1982 and now distributing across five continents, Datapath has customers in more than 100 countries Worldwide: covering multiple industries

such as professional audio and video, military, education, security, and health care.

a&s Middle East: How does Datapath differentiate itself in the video wall, control room, and visual solution industry?

Simpson: Datapath has over 40 years of experience in delivering innovative video solutions to businesses across the globe. With our in-house R&D, design, manufacturing, and quality control teams, we provide the latest, innovative solutions to the marketplace. Datapath solutions are used in high-end applications around the world – from government offices to defense, utilities, and blue light organizations.

As

a&s Middle East: What are the key features of your Aetria control room solution, and how has it evolved since its launch?

Simpson: Over the past decade, Datapath has charted a new course towards AV-over-IP control technologies. This, in turn, has seen solutions designed for creative multi-display videowalls, smallto medium-scale videowalls in business environments, and Command and Control rooms of any scale – a prime market focus for Datapath and its latest Aetria solution. Today, operators can oversee numerous 4K monitors, adding up to a similar pixel density as a large wall. With such a personal videowall, the operator will be more engaged in the detail and

good as a control room is in design or the technology used it is the operators who define how efficient operations inside and outside the control room are in times of need

The size of the wall in today’s control rooms is just as important as the actual resolution

the clarity of information because they are interacting with that media. Due to viewing distance, walls tend to be HD in resolution and the operator workstations are often 4K. The size of the wall in today’s control rooms is just as important as the actual resolution, so the trend has taken us from cubes to LCD panels and onto direct view LEDs, which are essentially a large blank canvas of pixels allowing for bezel-free, flexible displays containing the most essential sources. Data volumes are huge and need to be managed effectively. With minimum latency, Datapath’s Aetria Workstation provides a unique ‘bespoke video wall’

ability to operators, allowing them to display whatever sources they need on their desktop display; however, they wish to see them. The benefits of such personalized displays are clear – operators can focus on their specific task with only their relevant information and can share any content on the larger video wall when necessary (user rights permitting, of course). The recent introduction of its Aligo TX100 4K KVM solution gives Datapath the capability to offer operators seamless control of their content. The demand for better quality is a perennial requirement, and new Datapath developments have allowed

4K sources to be delivered to walls and workstations without the challenges of major compression. 10G networking means that multiple HD sources can be sent across a single wire and 4K sources can be delivered where they need to be with extremely little latency. Systems are now able to provide not only the 4K feed but also encoded versions of it so that the pristine quality version can go to the control room and a slightly lower quality one can be presented elsewhere, such as a crisis room, where 1080p is quality enough. Another of Datapath’s latest product launches – Aetria Touch – allows operators to manage their Aetria environment from a 10.5” tablet for even easier, faster display management. Screen layouts can be easily saved, and accessed with a full selection of sources available at the touch of a tablet.

a&s Middle East: Can you elaborate on the capabilities introduced with the Aligo and Arqa AV-over-IP solutions?

Simpson: The adoption of Audio-Visual over IP (AVoIP) technology continues at a pace, playing a crucial role in ensuring seamless communication and efficient operations. AVoIP enables the transmission of high-quality audio and video signals over a network infrastructure, allowing for real-time monitoring, collaboration, and decision-making. AVoIP, with or without keyboard, video, and mouse (KVM) functionality, is replacing basic video matrix switching and at the same time enabling connectivity with remote workers and between control centers. How operators can view that data is also evolving, as more control rooms are opting for larger workstations with more data sources available for individual operators, to provide better situational awareness at an individual operator level. Meanwhile, larger video walls for the whole control center are being replaced with smaller video walls and/or individual large displays for sharing between smaller groups of operators. This is where Datapath’s Aligo and Arqa transmitters and receivers are integrated with Aetria to enable full AVoIP with KVM functionality. Anything, anywhere, with complete content control.

a&s Middle East: Can you provide more details about the security features of your VSN controllers?

Simpson: Of course. Security is a prime concern for any Datapath applications. We ensure that all point-to-point content is TLS-encrypted at both ends for maximum protection. This is the same level of encryption used by military organizations. Furthermore, with our latest VSN V3, the chassis has also been redesigned, optimizing airflow to improve heat management and reduce noise. This new design, along with a new platinum-rated redundant power supply, makes this the most efficient VSN to date. The new chassis also includes hotswappable fans, enabling uninterrupted 24/7 use and maintenance in the most critical installations.

a&s Middle East: Can you discuss the advancements in your video wall technology and its impact on control room operations?

Simpson: However, as good as a control room is – be it in design or the technology used – it is the operators who define how efficient operations inside and outside the control room are in times

of need. Providing these operators with instant information-sharing tools is critical in ensuring decisions and actions are made as soon as possible to eliminate risks to resources, security, and, potentially, life itself. How is Datapath addressing the scalability and futureproofing of traditional control rooms? From its inception, Datapath’s Aetria has been designed to be scalable to Control Rooms of any size. Not only can it be applied to operations from the smallest to the largest organizations, but it can also work in harmony with legacy hardware from other manufacturers – via an API port – allowing end users to upgrade in stages if required.

a&s Middle East: What role do artificial intelligence and IoT play in your current product offerings?

Simpson: The talk of AI surrounding audio-visual solutions is often over-exaggerated. Aetria allows automatic switching to certain display templates in pre-set situations, but this is down to software and programming. Artificial Intelligence

The talk of AI surrounding audio-visual solutions is often over-exaggerated

will, I’m sure, play a bigger part in operations in the future.

a&s Middle East: Can you discuss any partnerships or collaborations Datapath has formed to enhance the security aspects of your solutions?

Simpson: Datapath has formed several strategic alliances with key partners in the security space. Exhibiting worldwide, we partner with security console providers such as Fountainhead and Poly-M along with display manufacturers such as Absen and Planar. These alliances allow customers to see fully operational solutions at demo centers and how all components work in harmony. Furthermore, Datapath technology is also licensed to work alongside key security platforms such as Milestone and Genetec, with no ‘alt/tab’ between platforms required.

a&s Middle East: How do you stay updated with the latest security trends and integrate them into your products?

Simpson: We work very closely with our partners and end-users, from initial planning to full side-by-side commissioning service. These relationships allow us to receive feedback directly from the

One of the main challenges is to get the market to understand that using 10G fiber signals to get visually lossless 4K60 with sub-millisecond zero latency is far superior to a compressed 1G copper signal

source. The concept of Aetria came from industry feedback and our R&D department is largely driven by what the market requires and what we can develop to meet those needs.

a&s Middle East: Can you describe the training and resources available for clients to ensure they maximize the security features of your products?

Simpson: The benefits of Aetria are plentiful and investment in training is a priority for users getting the most from our technology. Along with our online one-to-one training sessions, Datapath has demo suites and training centers all over the world. Offering AVIXA-approved courses, the latest of these has just been opened at the Mindstec Experience Center in Dubai. Here, visitors can see a fully operational ‘replicated’ Control Room and learn how Aetria works in various vertical markets – including defense, cyber security, utilities, and oil & gas.

a&s Middle East: How has the partnership with Mindstec enhanced your initiatives in Saudi Arabia and the rest of the region?

Simpson: Mindstec and Datapath have a long and trusted relationship that continues to thrive. They are our key partner for the Middle East and provide a valuable service in the region, not only in distribution, but for training support, client engagement, and marketing.

a&s Middle East: Can you highlight some key projects or partnerships Datapath has been involved in within the Middle East?

Simpson: We are not allowed to discuss most of the projects unless we have written permission, and the only one we have been given written permission Is Bahrain Sakir Circuit which is used for the F1 and other motor racing events, as is already published on our website.

However, we have many projects in all sectors including utilities, transportation, security (which includes Cyber and secure VIP locations), hospitality, retail, and events. We have many projects with Datapath’s Milestone integration plug-in and several already in the new mega site projects in Saudi Arabia.

a&s Middle East: What are the main challenges and opportunities you see in the Middle Eastern market for Datapath?

Simpson: One of the main challenges is to get the market to understand that using 10G fiber signals to get visually lossless 4K60 with sub-millisecond zero latency is far superior to a compressed 1G copper signal when competition promotes 1G for high-quality 4K60 also. Getting end users to switch to fiber especially if it’s an upgrade for them is then an extra cost, but the outcome (especially on a large video wall which is still very prominent in this region) is very noticeable when the image is enlarged more than on a normal desktop monitor where imperfections are not so noticeable. The opportunity is that we are one of the few that can offer an extremely high-quality video signal over 10G fiber with KVM ability and over long distances. As 10G is adopted more we will then have the most stable proven solution already installed in several projects in the region. n

TOO MUCH OF A GOOD THING? QATAR’S RAPID DIGITAL GROWTH OPENS DOORS TO CYBER ATTACKS

As Qatar’s rapid digitization fuels its transformation, the nation faces rising cyber threats, with over 5.1 million attacks in 2022 alone, prompting the launch of the National Cyber Security Strategy 2024-2030 to solidify its position as a global leader in cybersecurity

As Qatar embarks on a rapid journey towards becoming a fully digital society, the country reaps the benefits of swift technological advancements. However, the faster it digitalizes, the greater the risks it faces from cyber threats. The exponential growth of Qatar’s digital infrastructure and services, while beneficial, has also made it a prime target for cyberattacks.

Qatar’s cybersecurity market, which surpassed USD 1 billion in 2022, is projected to grow at a Compound Annual Growth Rate (CAGR) of 12.6% through 2026. With over 5.1 million internal and external cyber-attacks recorded in 2022 and around 45,000 intrusion attempts

successfully thwarted, the urgency to strengthen cybersecurity defenses has never been more pressing. The country’s ambitions to transition into a knowledge-based economy by 2030, coupled with its status as one of the top cloud users in the Middle East, underscore the critical need for a secure digital infrastructure.

Cybersecurity: A Growing Concern

The fast pace of digitization in Qatar, much like in other Gulf countries, has outpaced the implementa-

With over 5.1 million internal and external cyber-attacks recorded in 2022, the urgency to strengthen cybersecurity defenses has never been more pressing

tion of robust cybersecurity measures. As recently reported by Deutsche Welle, the Middle East is a “hotbed for data breaches, primarily due to rapid digitization outpacing cybersecurity infrastructure,” in the words of Mohammed Soliman, director of the Strategic Technologies and Cyber Security Program at the Washington-based Middle East Institute. His concerns are echoed by Joyce Hakmeh from Chatham House, who notes that although Qatar is leading the charge in public service digitization and SME growth, this progress often leaves security measures lagging behind.

Qatar’s vulnerability is exacerbated by its status as a top performer in the region. Ranked among the top three Arab nations in the Global Cybersecurity Index (GCI) alongside Saudi Arabia and Oman, Qatar has achieved global recognition

Mohammed Soliman, director of the Strategic Technologies and Cyber Security Program at the Washington-based Middle East Institute

Qatar’s cybersecurity market, which surpassed USD 1 billion in 2022, is projected to grow at a Compound Annual Growth Rate (CAGR) of 12.6% through 2026

for its proactive cybersecurity efforts. In 2024, Qatar attained a ‘role-model’ classification on the GCI, solidifying its position as a leader in cybersecurity at the international level.

The Impact of the FIFA World Cup

Qatar’s international recognition as a cybersecurity leader was further cemented during the FIFA World Cup 2022, a major event that placed the country’s digital infrastructure under intense scrutiny. The successful management of cybersecurity during such a high-profile event demonstrated Qatar’s capability to safeguard its critical infrastructure from malicious cyber actors. This event also highlighted the importance of safeguarding not only computers but also a wide range of electronic systems that are critical for smooth operations during global events.

According to Alya Al Kuwari from the National Cyber Security Agency (NCSA), cybersecurity is a comprehensive set of procedures designed to protect systems, networks, software, devices, and data from cyber threats, with safety and con-

fidentiality being the core principles. The NCSA also emphasizes that ensuring the accuracy of information and protecting it from unauthorized access is key to maintaining national security. Real-life tests in the form of events like the FIFA World Cup underscore the importance of robust cybersecurity measures, particularly in the protection of critical institutions such as government departments, hospitals, and private companies.

Core Pillars Supporting the National Cybersecurity Strategy

To address the rising cyber threats and ensure a secure digital environment, Qatar has recently launched the National Cyber Security Strategy 2024-2030, a comprehensive framework designed to tackle emerging cybersecurity challenges. Aligned with Qatar National Vision 2030, this strategy aims to position the country as a global leader in cybersecurity while ensuring the safe and secure use of current and emerging technologies.

The strategy is built around five key pil-

The greatest risk still lies in users’ lack of awareness, with phishing and cyber fraud rising from 12.5% in 2017 to 53% in 2022

lars: strengthening the cybersecurity and resilience of critical national infrastructure, developing legislation and regulatory frameworks, fostering a thriving digital economy, promoting research and innovation in cybersecurity, and encouraging regional and international collaboration. A significant focus is placed on cloud security, as most of Qatar’s data are stored in cloud spaces, making them vulnerable to cyber threats. Additionally, the Internet of Things (IoT), including smart home devices such as door locks, surveillance systems, and home automation technologies, introduces new layers of complexity in securing Qatar’s digital ecosystem.

The National Cyber Security Academy, established in 2024, is set to play a vital role in training professionals both in Qatar and across the Gulf Cooperation Council (GCC) region. The academy is part of Qatar’s broader efforts to develop a highly skilled workforce capable of managing the increasingly complex cybersecurity challenges posed by the digital age.

A

key

player on the international stage

Qatar’s proactive stance on cybersecurity is further exemplified by the establishment of its National Cyber Security Center (NCSC) in 2021, alongside Bahrain. This move marked an important

IN FOCUS

milestone in Qatar’s journey to building a resilient cyber defense infrastructure. In addition to domestic efforts, Qatar has also been a key player on the international stage. In 2022, Qatar’s National Cyber Security Agency (NCSA) and the U.S. Department of Homeland Security (DHS) signed a Joint Statement of Intent on Cybersecurity Cooperation (JSOI), aimed at enhancing bilateral cooperation on cybersecurity policy, strategy, and information sharing. Throughout 2024, Qatar has continued to strengthen its international partnerships. The NCSA represented Qatar in global forums, such as the Open-ended Working Group on the Security of Information and Communication Technology at the United Nations, and played an active role in the Executive Committee for Cyber Security in the Gulf Cooperation Council (GCC).

Addressing User Awareness and Education

Despite Qatar’s significant investments in cybersecurity infrastructure, one of the most persistent challenges remains the lack of user awareness. In 2017, phishing and cyber fraud accounted for 12.5% of all cybercrimes in Qatar. By 2022, that number had skyrocketed to 53%. This alarming rise highlights the need for comprehensive public education programs focused on increasing awareness about cyber risks and promoting safer online practices.

Cloud security has become indispensable as most of Qatar’s data are stored in cloud spaces, making them vulnerable to unauthorized access or theft

According to Al Kuwari cybersecurity is to be treated as a “national duty” in Qatar as one’s lack of awareness not only puts that person or organization at risk but also affects their surroundings, community, and the country. Simple measures, such as using strong passwords, enabling twofactor authentication, and installing reliable antivirus software, can go a long way in reducing the risk of cyber-attacks.

Challenges and Opportunities Ahead

While Qatar’s rapid digital transformation offers immense opportunities, it also presents challenges in ensuring the security of its digital landscape. The rise of smart cities, IoT devices, and AI-driven systems introduces new vulnerabilities that Qatar must address as it continues its digital journey. The complexity of these systems means that a one-size-fits-all approach to cybersecurity will no longer suffice. Instead, Qatar must invest in adaptable, forwardlooking security solutions that can evolve alongside technological advancements. At the same time, Qatar’s role as a regional leader in cybersecurity offers significant opportunities for collaboration with its GCC neighbors. The shared responsibility model emphasized in the National Cyber

Security Strategy highlights the importance of fostering trust and cooperation between the government, private sector, and international partners. This collaborative approach will be critical in maintaining Qatar’s position as a global leader in cybersecurity and ensuring the continued protection of its digital infrastructure.

Harmonizing Progress and Security in Qatar’s Digital Odyssey

Qatar’s swift march toward digitization is reshaping its economy and infrastructure, but it also opens doors to potential cyber threats. The country’s National Cyber Security Strategy 2024-2030 lays out a clear roadmap for tackling these challenges, from developing a resilient cyber infrastructure to fostering international cooperation. As Qatar looks toward 2030 and beyond, its efforts to balance innovation with security will be critical to the success of its digital transformation and the safety of its citizens.

The journey ahead is not without its hurdles, but with continued investment in cybersecurity, public awareness, and regional partnerships, Qatar is well-positioned to lead the Middle East in the safe and secure use of digital technologies. n

National Cyber Security Strategy highlights the importance of fostering trust and cooperation between the government, private sector, and international partners

Cyber Security

SOARING DATA BREACH COSTS ACROSS THE MIDDLE EAST CALL FOR NEW APPROACHES

As the Middle East continues to grapple with the surge in data breach costs, the adoption of advanced cybersecurity measures becomes not just a necessity but a critical component of any sound business strategy

The Middle East is grappling with an unprecedented surge in data breach costs, just at the time when everyone thought that the region had become a safe haven of advanced cybersecurity. A call to alarm was sounded by IBM’s “Cost of a Data Breach Report 2024,” which showed that the average cost of a data breach in the Middle East escalated to USD 8.75 million in 2024, up from USD 8.07 million in the previous year. This figure positions the region as the second-highest globally, trailing only behind the United States in breach-related expenses. How did we get here, and are these figures really that much of a surprise?

Stolen Credentials: 292 Days Too Long

This sharp increase reflects a broader global trend, with the worldwide average cost of a data breach rising by 10% to reach USD 4.88 million, marking the most significant jump since the COVID-19 pandemic. These escalating costs are attributed to a combination of factors, including lost business, operational down-

time, and expenses related to customer support and remediation efforts in the wake of breaches.

As businesses in the Middle East continue to expand their digital footprint, they face increasingly severe financial and reputational consequences from these breaches.

The report highlights that incidents involving stolen or compromised credentials are particularly challenging, with an average resolution time of 292 days. This extended period of vulnerability significantly contributes to the overall cost, as organizations struggle to restore normal operations and mitigate damage.

Red Flags in Healthcare and Finance

Speaking of damage, the presence of shadow data—information stored in unmanaged sources—further complicates the cybersecurity landscape, increasing breach costs by an average of 16%. This only serves to underscore the complexity of managing modern data environments and the need for comprehensive data governance strategies.

Industry-specific analysis reveals that sectors such as healthcare and finance in the Middle East experience some of the highest costs due to the sensitive nature

of their data and the critical importance of their operations. Globally, healthcare remains the most expensive industry for data breaches, with an average cost of USD 9.77 million, driven by the imperative to maintain patient trust and manage stringent compliance requirements.

The report also identifies that nearly half of all breaches involve customer personal data, including tax identification numbers, emails, phone numbers, and home addresses. The exposure of such sensitive information not only heightens the risk of identity theft and fraud but also significantly elevates breach costs due to the need for extended post-breach response measures.

Invisible Price of Data Breaches

To grasp the full scope of damage incurred by data breaches, organizations in the Middle East will have to take a closer look at less visible components of an average breach cost. Beneath the surface of immediately evident damage, these expenses encompass business disruption, regulatory fines, legal fees, and efforts to remediate and contain the breach. Business disruption costs are particularly high in the region, driven by the loss of customer trust and the need for extensive post-breach

The

average cost of a data breach in the Middle East escalated to USD 8.75 million in 2024

responses. These factors contribute to nearly 50% of the total cost of a breach, underscoring the profound impact of cyber incidents on businesses’ bottom lines.

The Middle East’s increasing reliance on emerging technologies such as artificial intelligence (AI) and the Internet of Things (IoT) has expanded the attack surface, making organizations more vulnerable to cyberattacks. This digital transformation, while necessary for maintaining competitive advantage, has created an environment where the cost and frequency of breaches are likely to increase further without adequate cybersecurity measures.

Bridging the Skill Gap: Is AI the First Aid?

One of the report’s key findings is the role of AI and automation in mitigating breach costs. Organizations that have extensively deployed these technologies in their cybersecurity infrastructure reported significantly lower breach costs. Businesses utilizing AI for threat detection and response saw a reduction in breach costs by an average of USD 1.88 million compared to those that did not use these technologies.

However, the Middle East appears to be lagging in adopting these advanced technologies, presenting an opportunity for organizations to invest in AI-driven cybersecurity tools to enhance their overall security posture. By leveraging AI and machine learning, companies can improve their ability to detect anomalies, predict potential threats, and automate incident response processes, significantly reducing the risk of a successful attack.

The cybersecurity skills shortage in the Middle East presents another significant challenge. More than half of the organizations surveyed reported a critical lack of skilled cybersecurity professionals, a factor that directly correlates with higher breach costs. This skills gap is exacerbated by the rapid digital transformation across the region, which has outpaced the development of local cybersecurity talent.

To address this challenge, regional governments and private sector leaders must invest in cybersecurity education and training programs. Fostering a culture of continuous learning within organizations

More than half of the organizations surveyed reported a critical lack of skilled cybersecurity professionals

can help ensure that existing IT staff are kept up-to-date with the latest cybersecurity trends and technologies. Partnerships with international cybersecurity firms and educational institutions can also play a crucial role in accelerating the development of local expertise.

Charting a Secure Future

To avoid this and many other traps identified in IBM’s report, regional organizations will have to rethink adopting a more proactive approach to cybersecurity without procrastination or unnecessary delays. Lagging only behind the USA in the list of data breach costs is surely a cause for alarm

for both the organizations and the regulatory body that will have to invest more in advanced technologies such as AI and machine learning for threat detection and response, while simultaneously addressing the cybersecurity skills shortage through targeted training programs, and ensuring compliance with regulatory requirements. In addition to these measures, companies should also focus on creating a cybersecurity culture that emphasizes the importance of vigilance, continuous improvement, and resilience against evolving threats. By embracing all of these, organizations can build a resilient cybersecurity framework capable of defending against current threats and anticipating future challenges. n

Figure 1. Measured in USD millions
Global average total cost of a data breach in USD millions
Cost of a data breach by industry in USD millions
Figure 3. Measured in USD millions

Bosch

ALWAYS SAFER AND FIT FOR THE FUTURE WITH BOSCH –INNOVATION FOR LIFE

Thomas A. Knauel, Director of Bosch Product Management, hightlights Bosch’s leadership in innovation by incorporating multi-sensor detection, AI, and IoT into its fire safety solutions and delivering enhanced speed, precision, and reliability in line with the brand’s “Invented for Life” philosophy

Today’s customers typically expect digitally enabled products and services that they can access and operate at all times at home, at work, and on the go. Bosch is a technology-driven company in an increasingly connected world. The development of each new product embraces the latest innovations, including multi-sensor capabilities, artificial intelligence, deep learning, and the Internet of Things. And these smart technologies have been embedded within the innovative portfolio of Bosch Fire detectors, alarms, and related cutting-edge systems and services.

a&s Middle East: You are the head of Bosch Fire Product Management. Tell us more about yourself, when did you start working for Bosch Fire, what does your role include, where have you worked before and in what positions, and a bit about your education?

Knauel: I joined Bosch End of 2000 as a management trainee in the area of sales and marketing. Two years later I had the opportunity to join the building technologies division as a product manager for fire alarm systems. Did

that for a few years and then moved with Bosch to Singapore for a regional sales management role. Returning to Germany I took on the leadership role for product management in Bosch for fire alarm systems. Today I’m responsible for Global Product management but also Strategy development for Bosch Fire. So, you can say I’ve been in the industry for 20-plus years. I quite like being exposed to different cultures and people. I am German but I have lived

in the US, UK, Singapore, and China –which I enjoyed a lot.

a&s Middle East: What are the company’s plans for international business development following the announcement of selling three major divisions?

Knauel: As you correctly point out, Bosch is realigning its Building Technologies division. The company plans to sell most of the division’s product business. This includes

the Video, Access and Intrusion, and Communication business units. But the product business with fire alarm systems will not be sold. In fact, our international fire detection business will continue with the same commitments and ambitions in all countries where we are present today. We will maintain our sales channels, partnerships, and contracts. Also, we will make further investments in our portfolio. So, we are excited to continue to contribute with our partners to the success story of the Bosch life safety business, which lasts already for over 100 years.

a&s Middle East: Does Bosch have some focus on specific industries as part of your strategy?

Knauel: Bosch offers an extensive range of products in the field of fire detection. These products allow us to realize tailormade solutions for almost any type of project, from manufacturing plants to commercial buildings, from hospitals to

airports. Now, our systems and products bring unique capabilities to overcome specific challenges faced by different industries. Let me share a few examples. In case of an alarm in hospitals, many patients require assistance for descending stairwells while elevators are out of use.

The Bosch Smart Safety Link enables the integration of voice alarms with fire detectors and assists safety managers with emergency evacuations allowing for a highly effective gradual evacuation approach. Next, unplanned downtime in manufacturing is extremely cost-intensive. Electrical machinery and electronic devices on industrial plants create electromagnetic disturbance values which risk disruption to production and other operations. The eSmog feature of AVENAR 4000 fire detectors is electromagnetic-compatible. The detector is therefore informed of disturbance values from sources such as equipment, which greatly reduces the risk of false alarms and subsequent downtime and evacuations. In hotels, museums or flagship office

buildings aesthetics play a major role. Our flat fire detectors are ultra-slim with a smooth surface, thereby being unintrusive and hardly visible on the ceiling. We even offer a choice of 16 RAL colors to complement interiors. And a last example today. Detecting fires in half-open spaces is difficult due to wind and weather effects. Our AI video-based fire detection solution, AVIOTEC, provides outdoor fire detection near buildings where virtually no other detection technology is available. It enables the detection of smoke and flames even in windy conditions. This is ideal for outside storage areas, hangars at airports, or solar plants.

a&s Middle East: Sensors using multi-criteria are already prevalent in the market for a while. Is complex data fusion of several sensors which thoroughly evaluates all combined phenomena before triggering any reactive output an intelligent innovation with huge potential for fire safety?

Knauel: Yes, it is. Bosch was one of the first companies to introduce true multicriteria detection to the market. The trend towards multi-sensor technology will continue as false alarms are still an issue in our industry. Reasons for false alarms are manifold. Some are more difficult to address from a manufacturer’s perspective than others. For instance, human error can be considered in the product design but not completely mitigated. However, false alarms stemming from environmental factors such as steam from cooking or showering, dust and dirt, or aerosols from processes in industry or laboratory environments can be solved using technology. The AVENAR detector 4000 series provides a superior level of fire detection. It allows optical and thermal sensors to be combined with sensors for chemical matter, such as carbon monoxide gas. This means monitoring for all of these phenomena can occur simultaneously. The captured detection data is then instantly analyzed against the data of real fire patterns. Genuine fire alerts are triggered rapidly while the level of robustness against nuisance alarms is impressively high: AVENAR 4000 detectors can, for instance, distinguish combustible CO gas from harmless steam and real smoke particles from regular dust particles using the so-called Dual Ray Technology. This is an outstanding benefit for safety managers.

a&s Middle East: How have AI and machine learning been affecting the fire safety industry? Please illustrate the answer with examples and trends.

Knauel: AI and machine learning are increasingly revolutionizing everything from production lines to healthcare diagnostics but also our daily lives. AI models with deep learning algorithms can be developed to recognize, categorize, characterize, and process input data, including imagery, speech, language, and behavior. In the fire domain, AI enhances fire prevention, detection, response, and risk assessment. These technologies are being integrated into various aspects of fire safety systems, from monitoring fire hazards in real time to automating emergency responses. Let me give you some examples. AI-powered fire detection systems use deep learning algorithms and computer vision to analyze video footage in real time. These systems can identify fire hazards and detect smoke or flames much faster and more accurately than traditional methods, reducing response times and thus limiting damage. Also, machine learning models can be used to predict potential fire risks by analyzing vast amounts of historical data, including environmental factors (such as weather, humidity, and vegetation) and human activity patterns. This data helps in assessing high-risk areas, which can be useful for resource allocation and proactive risk mitigation. Thirdly, AI can be used in the planning but also maintenance phases of a project or an existing installation increasing the efficiency and effectiveness

of the relevant activities. For instance, we are working on a System Planning Co-Pilot which will help planning engineers in their daily work.

a&s Middle East: Video-based fire detection technology has been in focus of Bosch Fire R&D for the last couple of years. What are its features and advantages compared to other fire alarm technologies?

Knauel: Bosch Fire has adopted this technology to recognize the behavior of real smoke and flames: AVIOTEC 8000i IR video-based fire detection uses smart functionality to reliably detect fires at their

source within seconds. The devices record live footage of an area with a 4-megapixel video camera inside a protective IP67 housing, which enables high-quality images in all environmental conditions. It analyzes this footage for any indication of a fire, based on hours of pre-stored footage of real flames and smoke. AVIOTEC supports business continuity as well as safety with deep learning algorithms which can be trained and adapted to recognize harmless phenomena and activities, such as cigarette smoking, which sets off false alarms in traditional detection systems. This technology makes AVIOTEC highly dependable. Furthermore, its dual-output relay helps safety managers differentiate between system troubleshooting requirements and fire alerts.

a&s Middle East: What kind of spaces has AVIOTEC been specifically designed for and can you give us an example?

Knauel: AVIOTEC has been specifically designed for environments where traditional fire detection systems may face some limitations. For example, in warehouses or aviation hangars, AVIOTEC is particularly useful because traditional smoke detectors may have delayed responses due to high ceilings, large open spaces, or ventilation systems that disperse smoke before it reaches the detectors. Industrial environments, especially those with machinery, flammable materials, or chemicals, benefit from AVIOTEC’s rapid fire detection, as it can detect fire or smoke visually without relying on heat or particles reaching a detector. And as mentioned before our Video-based fire detection system of-

fers a fire detection solution for outdoor areas for which other fire detection products simply can’t be applied to.

a&s Middle East: As in other parts of our lives, IoT is being integrated into fire safety systems as well. Have you managed to catch up with this trend and in what way?

Knauel: The Internet of Things (IoT) supports the use of smart devices, provides connectivity for smart homes, and accelerates and enhances productivity with instant data transfer and data-based decision-making. IoT is being continually integrated into our lives and work and, more recently, in specialized areas such as fire safety systems. IoT-enabled systems are, however, not new to the Bosch Fire portfolio. The groundbreaking Remote Services have already been available to system integrators and maintenance workers for several years. This solution allows them to conduct fire safety system health checks at a distance over tablets and smartphones, thanks to real-time connectivity and data feeds. This was already a huge leap forward in remote maintenance of fire alarms for advanced fire safety – and a huge timesaver with spared journey times of traveling to sites to check, for example, the remaining battery life of the equipment.

a&s Middle East: But, Bosch has not stopped there. You have also introduced Nexospace Fire System Explorer. Tell us more about it. What was the idea behind its development?

Knauel: A decade ago, we pioneered remote services by connecting fire alarm systems to the IoT. Well, now, with NEXOSPACE, we are taking it a big step further. The Bosch Building Technologies digital suite, NEXOSPACE, has now been adapted to include data capture, management, and analysis of all Bosch Fire Alarm Systems with the NEXOSPACE Fire System Explorer (FSE). Interconnectivity of FSE with all fire safety equipment and devices empowers system integrators with full transparency of an entire fire safety system. This increases efficiency for integration, maintenance, and upgrades and reduces false alarms even further thanks to rapid remote troubleshooting and fewer operational interruptions. System integrators managing fire safety for multiple sites or buildings in distant, hard-to-reach locations or ex-

tremely dusty or humid environments will be relieved of the cumbersome effort of frequent up-close system health checks. Similarly, those responsible for sites with high fire loads can stay continually vigilant and up-to-date over the clear interface of the Bosch FSE. The smart, fully IoT-ready functionality and intuitive user experience of FSE will win over customers from all industries who are interested in investing in a fire safety system at the competitive edge.

a&s Middle East: What large projects has Bosch Fire been involved with recently and what is the customers’ feedback?

Knauel: Bosch Fire Alarm Systems have been successfully implemented in numerous high-profile projects globally, showcasing their adaptability and reliability in diverse environments. Our systems are installed in Germany’s largest airports Frankfurt and Munich but also internationally. One notable example here is the Mactan-Cebu International Airport in the Philippines. This rapidly growing hub required a scalable and modular fire detection system to ensure the safety of millions of passengers annually. Bosch’s solution provided comprehensive fire protection, integrating advanced smoke detection technology to offer rapid response and clear, timely alerts throughout the facility.

INTERVIEW

Middle East Fire Safety Market is Shifting Towards AI and IoT Solutions

Onur Sönmez, Bosch’s Head of Sales and Marketing for Fire Systems in Türkiye, Middle East, and Africa, highlights the growing demand for innovative fire safety technologies in the region and Bosch’s strategy to educate the market while maintaining strong local partnerships.

a&s Middle East: Do you find that the Middle East is mature for the latest fire technologies we have been discussing with your Product Manager? Are you receiving customer inquiries about these types of technologies and how do you communicate its benefits to the market?

Sönmez: From my experience, the traditional approach to Fire Alarm Systems is still dominating the market, but we also start to observe that demand for more innovative solutions is a growing trend. Businesses and organizations become more aware of the critical role fire safety plays in ensuring operational continuity and protecting assets. In fact, we are increasingly receiving inquiries from customers who are interested in the types of technologies we’ve been discussing, such as AI-based fire detection, IoT-enabled systems, and video-based solutions like AVIOTEC. To communicate the benefits of these technologies, we focus on educating the market and performing POC tests about how these solutions not only enhance safety but also provide longterm value through reduced false alarms, quicker response times, and integration with existing smart building systems. The market in the Middle East may still be in the early stages of adopting these future-proof solutions, but I believe we will see a much broader shift toward these advanced fire safety technologies in the near future.

to our Middle East customers. Our fire detection operations will keep all current sales channels, partnerships, contracts, and sales local teams intact. This ensures that our Middle East customers will continue to benefit from Bosch’s renowned expertise and innovation in life safety.

a&s Middle East: What is the strategy for the Middle East region for fire detection in the next few years?

a&s Middle East: How will the sales of other divisions affect Bosch customers in our region?

Sönmez: The upcoming sale of Bosch’s Video, Access and Intrusion, and Communication divisions will not affect our fire alarm systems business in the Middle East region. We remain steadfast in our commitment to fire detection solutions and will continue to deliver the same exceptional service and support

Another project, now from the Adria region, is Continental’s tire manufacturing facility in Timisoara. Like many industrial environments, it faced significant fire safety challenges due to the presence of flammable materials and complex production machinery. Bosch Security addressed these challenges by installing AVENAR panels 8000 along with AVENAR 4000 detectors. Bosch’s tailored approach not

Sönmez: The market serves a diverse range of verticals, including commercial and residential real estate, oil and gas, hospitality, manufacturing, healthcare, and transportation. Each of these sectors demands customized fire protection solutions to address specific needs and comply with local regulations. With construction projects on the rise, the demand for advanced fire systems that seamlessly integrate with building automation and monitoring technologies is also growing. As a global fire alarm system manufacturer, our focus is on building strong relationships with key stakeholders, including architects, consultants, contractors, and facility managers. Providing comprehensive solutions that not only meet regulatory requirements but also enhance overall safety and operational efficiency sets us apart in the market. Given the varied regulations and market dynamics in each country across the region, our primary strategy is localization. To achieve this, we work with local system integrators (SIs) who are wellequipped to meet the specific needs of their markets. Together with my team, we actively support these local SIs, offering commercial training and organizing events to promote Bosch Fire Alarm’s unique selling points. In addition to these efforts, we implement a wide range of sales and marketing campaigns, both locally and globally. This includes product information webinars, sessions on fire alarm system solutions tailored to key verticals, as well as online commercial and technical training. We also conduct sales campaigns targeting specific product groups. Furthermore, we participate in major local events and exhibitions to showcase our key products and engage directly with stakeholders and decisionmakers on various projects.

only met but exceeded Continental’s stringent safety requirements.

a&s Middle East: Having all these innovations in mind, what technologies and solutions can we expect from Bosch Fire in the recent future?

Knauel: At Bosch, we are committed to pushing the boundaries of technology.

That’s in our DNA. In the fire safety space, we will continue and expand to integrate AI, IoT, and predictive analytics into our portfolio, providing future-proof solutions that deliver greater precision, faster response times, and improved reliability. Allow me to keep this a little vague but let me say this: Customers can expect continuous innovation that enhances both safety and business continuity across all sectors. n

CYBERSECURITY EVENTS

FIVE GUINNESS WORLD RECORDS ARE TESTAMENT TO OUR CYBERSECURITY EXCELLENCE

In an interview with a&s Middle East, Eng Badar Al Salehi, Head of Oman National CERT and the ITU-Arab Regional Cybersecurity Center, discusses the significance of cybersecurity in the Middle East’s digital economy, global collaborations, and the objectives of aligning cybersecurity with Oman’s Vision 2040.

a&s Middle East: What are the key objectives of this year’s 12th Regional Cybersecurity Week, and how do they reflect the growing importance of cybersecurity in the Middle East’s digital economy?

Al Salehi: The 12th Regional Cybersecurity Week is one of the key strategic Annual initiatives of the ITU-Arab Regional Cybersecurity Center (ITU-ARCC) in Oman that was established in 2013 where the Week comes under the capacity building pillar of the Center. This year’s theme centers on “Cybersecurity as an Enabler for the Digital Economy,” emphasizing key strategies to advance the field. One of the primary focuses is on enhancing cyber resilience, with discussions on how businesses can bolster their defenses against ever-evolving cyber threats as the digital economy expands. We will also discuss the ways of fostering economic growth and the role of cybersecurity in attracting foreign investment and maintaining consumer trust, especially as e-commerce and digital services grow. There is also an emphasis on policy development, as participants collaborate on crafting regulations that support economic growth while en-

suring data privacy. Furthermore, we will tackle capacity-building initiatives aimed at investing in training and human development programs to upskill the workforce, ensuring that local talent meets the demands of a digital economy.

a&s Middle East: How does the 12th Regional Cybersecurity Week facilitate collaboration between regional and international cybersecurity experts?

Al Salehi: A reference to the continued successes achieved by the Regional Cybersecurity Week that was widely praised by local and international participants. Given the importance of the topics addressed in the conference, in addition to the participation of a group of international experts and speakers as well as international cybersecurity companies and organizations that participated in the accompanying exhibition and presented a range of cybersecurity solutions and technologies, such continued success of the Cybersecurity Week resulted in being awarded five world Guinness record awards in the 2023 edition, breaking records for the largest global gathering attended by over 1600 participants from more than 70 countries around the world, including Arab and Islamic countries, African nations, and East Europe as well as central Asia which made the regional

Cybersecurity Week to be the largest cross-regional cybersecurity event. The 12th Regional Cybersecurity Week will feature an array of activities, including panel discussions and workshops. These sessions will bring together regional and international experts to exchange best practices and case studies, fostering knowledge sharing. Networking opportunities will be abundant, allowing participants to form partnerships that can lead to joint cybersecurity initiatives. Projects and initiatives, such as collaborative research or pilot programs, will be launched to address complex cybersecurity challenges. Additionally, the event will provide a platform for signing memorandums of understanding (MoUs) and forming collaborations between cybersecurity agencies and the private sector.

a&s Middle East: Can you elaborate on Oman’s role as a regional hub for cybersecurity industry development and Innovation?

Al Salehi: The Sultanate of Oman has listed cybersecurity as one of the key priorities from an economic perspective in Oman’s Vision 2040 and has established cybersecurity industry development and innovation program “Hadatha program” in November 2022 with a vision of “specialized cybersecurity indus-

The 12th Regional Cybersecurity Week will feature an array of activities, including panel discussions and workshops. These sessions will bring together regional and international experts to exchange best practices and case studies, fostering knowledge sharing

try promoting economic growth and diversification “by establishing specialized cybersecurity industry in the region focusing on human capitals and driven by Innovation, creativity, and excellence. The objectives of the program include aligning with Oman’s Vision 2040, particularly in addressing cybersecurity challenges. Efforts will be directed towards developing a national cyberse-

curity ecosystem, fostering the growth of specialized cybersecurity capabilities within the country, and creating a thriving environment for SMEs and startups to address domestic needs and challenges. Local companies will also be encouraged to expand internationally, promoting Oman’s cybersecurity innovation on the global stage. Key initiatives include supporting research and develop-

ment (R&D) in cybersecurity, establishing partnerships with private sectors, academia, and government entities, as well as collaborating with international partners. Special incentives will be introduced to attract foreign investment, further strengthening Oman’s position in the global cybersecurity landscape. Through the ITU-Arab Regional Cybersecurity Center (ITU-ARCC), Oman is leading a number of cybersecurity industry development initiatives and projects in collaboration with global cybersecurity firms as well as helping to build a skilled workforce in the region.

a&s Middle East: How does setting five Guinness World Records for the Arab Regional Cybersecurity Centre in 2023 influence the goals of this year’s event?

Al Salehi: Such recognition for the 2023 version of Cybersecurity Week resulted from our strategic regional and international collaboration and partnership with regional and international organizations where the Cybersecurity Council of the UAE has kindly hosted the event in Abu Dhabi and the valuable participation and cooperation of ITU, OIC-CERT, FIRST, Arab league, etc. had significant importance and contribution to such success and recognition. This will influence this year’s event by giving it global recognition, enhancing the visibility of the Arab Regional Cybersecurity Week, and highlighting its dedication to excellence and innovation in the field. Setting new records will energize participation and draw attention to the critical role cybersecurity plays in economic growth. These achievements will also serve as a benchmark for future goals, fostering continuous innovation in cybersecurity practices.

a&s Middle East: How does the 12th Regional Cybersecurity Week address cybersecurity challenges unique to the Middle East?

Al Salehi: The 12th Regional Cybersecurity Week addresses how regional conflicts/interests create unique cyber threats/ opportunities emphasizing collaborative strategies through the Cybersecurity Diplomacy Initiative led by Oman to the region.

Following the cybersecurity conference in collaboration with ITU, FIRST, and

OIC-CERT, there will be a two-day comprehensive cybersecurity simulation of real-life attacks on critical national infrastructure that cause millions of dollars of losses. The scenarios will highlight the attack trends that any country can be a potential target of. The scenarios will lead to lessons on culturally relevant cybersecurity practices that respect local norms while enhancing security protocols and highlighting the need for tailored solutions to combat specific threats prevalent in the region.

a&s Middle East: What initiatives, such as the 1st GCC cybersecurity Hackathon contribute to advancing regional cybersecurity?

Al Salehi: The 1st GCC Cybersecurity Hackathon is the 1st in the Industry Development platform that brings together innovators from the GCC countries in one place to convert their ideas into realistic models for products or solutions for the common cybersecurity challenges faced by the GCC countries, which will contribute to the development of

Following the cybersecurity conference in collaboration with ITU, FIRST, and OICCERT, there will be a two-day comprehensive cybersecurity simulation of real-life attacks on critical national infrastructure that cause millions of dollars of losses

the cybersecurity industry in the GCC and Internationally.

Such hackathons and initiatives will promote a culture of cybersecurity innovation throughout the GCC and surrounding regions. They will address challenges faced by the public and private sectors, working to develop solutions that address these issues. Furthermore, the initiatives will support cybersecurity startups, freelancers, and entrepreneurs, fostering the development of specialized local products and solutions across the GCC and beyond. Furthermore, as we will explore the advancements in cybersecurity threats and the importance of staying ahead of

the curve to protect our digital infrastructure; It is imperative that we adapt and strengthen our defenses to combat the growing sophistication of cyber threats. In conclusion, Cybersecurity is crucial indeed but we should always see the white side of it as an opportunity too. We would like to thank our partners, and stakeholders for joining us on this journey towards a more secure cyberspace. We believe in the power of partnership and together, we can navigate the complexities of the cybersecurity landscape and build a resilient defense against cyber threats while capturing potential social and economic opportunities. n

MILIPOL’S ROLE IN ADVANCING SECURITY ALIGNS WITH QATAR’S VISION 2030

Anne Frayssinet, Milipol Network Director, shares her thoughts on the challenges and opportunities shaping the industry, highlighting how the Milipol shows play a key role in presenting the latest security innovations, fostering global collaboration, and paving the way for the future of homeland security in the Middle East and beyond

Under the high patronage of His Highness Sheikh Tamim bin Hamad Al-Thani, Amir of the State of Qatar, the 15th edition of Milipol Qatar, the Global Event for Homeland Security and Safety, will be held under the theme “The technology in the service of security” from October 29-31, 2024, at the Doha Exhibition and Convention Centre (DECC). Anne Frayssinet, Milipol Network Director, discusses the critical topics of innovation, global collaboration, and the evolving security landscape, as Milipol Qatar 2024 approaches.

Can you elaborate on the key factors behind Milipol’s enduring success and global recognition in the security sector?

Frayssinet: Milipol Paris is a premier event that gathers the entire internal security ecosystem, including buyers and solution providers. It serves as a hub where companies and exhibitors engage with market realities, discuss developments, and anticipate future trends. The global homeland security market is witnessing significant growth driven by increasing security challenges such as terrorism, cyber threats, and natural

Advanced technologies and government initiatives are propelling the market towards substantial expansion

disasters. Advanced technologies and government initiatives are propelling the market towards substantial expansion. As technology evolves rapidly, information and communication systems become more interconnected and complex, necessitating state-of-the-art solutions to

prevent system failures and malicious acts. Milipol Paris showcases the latest innovations that address current and future threats effectively. Additionally, we have expanded Milipol events globally, including Qatar in 1996, Singapore in 2015, and New Delhi in

The event, themed “Powering Innovation: A Safe & Secure Future,” is Asia Pacific’s flagship homeland security gathering both public and private sector security

October 2023, allowing companies to enhance their global market positions alongside leading contractors. The Milipol Network, with its numerous exhibitors, speakers, conference cycles, and workshops, offers comprehensive solutions to combat various forms of crime.

The recent Milipol Asia-Pacific was a significant event. What were some of the highlights and key takeaways from this year’s edition?

Frayssinet: This year’s major highlight was the collaboration between Milipol Asia-Pacific and HTX’s TechX Summit, showcasing the central role of science and technology in enhancing public safety and national security in the Asia Pacific. The trade exhibition featured the latest homeland security innovations, while the TechX Summit hosted high-level conferences with prominent government officials, industry leaders, and academia.

Singapore’s Minister for Home Affairs and Law, Mr. Kasiviswanathan Shanmu-

gam, and France’s Minister of the Interior, Mr. Gérald Darmanin, were notable attendees.

The event, themed “Powering Innovation: A Safe & Secure Future,” is Asia Pacific’s flagship homeland security gathering both public and private sector security. Significant growth has been observed in homeland security technology, particularly in AI surveillance, airport infrastructure security, and cybersecurity. Milipol AsiaPacific’s presence expanded by 30% this year, featuring 305 exhibitors from 31 countries across a 14,500 sqm exhibition space.

Notable global companies such as AREA S.p.A, ClearTrail Technologies, ESRI, Hikvision Technology, Innovatrix, Idemia, Microsoft, NUIX, Swissdrones, Thales Solution Asia, VMI Security, and WEY Singapore Technology participated, along with country pavilions from China, Italy, France, Germany, Hungary, Singapore, and the USA. The HTX Pavilion highlighted innovations from HTX and key industry partners, including ST Engineering,

CISCO, DXC Technology, and Samsung. Looking ahead to Milipol Qatar, what are some of the key preparations and priorities your team is focusing on?

Frayssinet: Our current focus includes organizing international pavilions, the conference program, the opening ceremony, the gala dinner for sponsors and exhibitors, and sending invitations to official delegations. We are also addressing all exhibitor inquiries to ensure their preparations for the show are seamless. Additionally, visitor registration is now open, allowing attendees to obtain their passes online.

What emerging trends and critical topics in security do you plan to highlight at Milipol Qatar?

Frayssinet: Milipol Qatar attracts the leading global public and industrial security players who showcase the latest security, safety, detection, and prevention equipment, systems, and services. The event aligns with Qatar’s National Vision 2030, addressing the country’s growing security needs. The 15th edition of the show, scheduled for October 29-31, 2024, at the Doha Exhibition and Convention Centre, will build on the success of its previous edition, which featured 222 exhibitors from 22 countries, 11,500 visitors from 84 countries, 389 official delegates, and secured contracts worth 592 million QAR. The event seminars attracted over 500 attendees.

As head of Milipol events and the Milipol Network, what is your vision for the future of these events? How do you see them evolving in the next five to ten years?

Frayssinet: In an increasingly uncertain environment, protecting people and infrastructures requires constantly updated resources and solutions. Milipol events enable global security professionals, from both public and private sectors, to find the most suitable equipment and technologies for their needs by bringing together solution providers, manufacturers, and distributors. These events offer several advantages, including economic support for the security industry, strengthened bilateral cooperation between ministries of interior, and a unique platform for promoting exports from the security sector. I am confident that the Milipol Network will continue to be the world’s leading network of events dedicated to safety and homeland security, fostering innovation and collaboration in the industry. n

SUPREMA

BIOENTRY W3: AI-DRIVEN FACIAL AUTHENTICATION WITH ADVANCED PRIVACY PROTECTION AND DURABILITY

Suprema unveils BioEntry W3 AI facial authentication device that combines top-tier security with stringent data privacy measures, designed for highsecurity environments and diverse applications

n Source: Suprema editorial@asmideast.com

Suprema, a global leader of AIbased security solutions, has announced the launch of BioEntry W3, an AI-powered facial authentication device designed for high-security environments.

Privacy-First Design

The BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication method. The display-free design prevents facial images from being shown on a screen, instead communicating the authentication result through LED indicators and text. This ensures that facial authentication data remains protected from nearby unauthorized individuals in public spaces. Suprema’s ToM method allows users to store and manage their facial images on their personal mobile devices, meaning facial data is never stored in the security system itself. This empowers users with complete control over their biometric

Suprema’s ToM method allows users to store and manage their facial images on their personal mobile devices, meaning facial data is never stored in the security system itself

data while maintaining security integrity. Equipped with a Secure Element (SE) chip, the BioEntry W3 encrypts all data, and stores encrypted data and

cryptographic keys in an isolated environment, ensuring that even in the event of a data breach, decryption is impossible. Also, BioEntry W3 is

compliant with major regulations and certifications, including the NIS2 Directive, GDPR, ISO/IEC 27001, and ISO/ IEC 27701, highlighting Suprema’s dedication to data security and privacy management.

Advanced AI and Edge Processing

Despite its simple mullion-type design, the BioEntry W3 offers exceptional facial authentication performance and durability, making it ideal for both indoor and outdoor environments. Its deep learning-optimized Neural Processing Unit (NPU) allows for fast and accurate facial authentication at the edge, face matching in just 0.2 seconds. By processing authentication data in real time at the edge, the device eliminates reliance on network connectivity and reduces latency, making it highly effective in high-traffic environments where security and efficiency are paramount.

Built for Any Environment

The slim design and high durability make the device easy to install in any location, optimized for outdoor environments. Its IK08 impact resistance ensures that the device can withstand physical impacts, enhancing its reliability and security in various outdoor conditions. With IP67 water and dust resistance, the device is built to endure extreme weather and environmental conditions, including deserts, ensuring minimal damage and longlasting performance.

“BioEntry W3 is a future-proof solution that represents a significant leap forward in facial authentication technology,” said Hanchul Kim, CEO of Suprema Inc. “It is designed to meet the evolving demands of both security and privacy. By combining advanced AI and edge processing with a privacy-centric design, we’ve developed a solution that delivers top-tier security while enhancing the user experience. Addi-

BioEntry W3 is a future-proof solution that represents a significant leap forward in facial authentication technology

tionally, its robust durability and scalability ensure that the BioEntry W3 can adapt to diverse environments, effectively meeting the varied needs of customers.”

The 6th edition of Intersec Saudi Arabia will be held in association with the Ministry of Interior and Saudi Civil Defence from October 1-3, 2024, at the Riyadh International Convention Centre.

Suprema’s innovative product line-up, including the newly released BioEntry W3, will be showcased. We invite you to visit our partners’ booths at Intersec KSA 2024 to experience the latest in security technology. The two booths are located at Hall 5, Booth D-24 with ALKURDI Trading and Contracting Company, and Hall 1, Stand E-24 with Horizon Informatics. n

CYBERSECURITY

FORTIFYING DEFENSE: HOW CRITICAL SECURITY UPGRADES ARE THE UNSUNG HEROES IN PROTECTING AGAINST CYBER-ATTACKS

The sharp increase in cyberattacks in 2024, fueled by outdated legacy systems, highlights the urgent need for businesses to upgrade their security measures to avoid severe financial, data, and reputational losses

Not a month goes by without news of a cyberattack making the headlines. Already in 2024, there have been over 9,000 publicly disclosed global security incidents resulting in an estimated 35 billion breached records, significantly up from the estimated 8 billion breached records in 2023 (IT Governance, 2024). Although the type of attack may vary, there’s one commonality among the statistics: most are a result of legacy hardware and software.

Legacy Hardware and Software as a Hidden Threat

A legacy is often fondly described as the long-lasting impact made by a person or event. In the security industry however, legacy refers to software or hardware that has been superseded, and often its continued presence becomes more hindrance than help, with the use of legacy solutions now considered an enabler in the increased likelihood of cyber-attacks.

These startling numbers paint a clear picture that upgrading security hardware and software is of critical importance for businesses around the world. The battleground of commerce and communication has shifted from the physical world to the digital world, and as technology advances, so do the methods employed by cybercriminals. In this shifting landscape, security systems are the frontline of de-

fenses, making it imperative for businesses to maintain their cyber health in the relentless pursuit of security.

A Proactive Approach to Cybersecurity

As cyber and physical security continues to evolve, legacy software and hardware pose a serious threat to business ef-

ficiency, reputation, and competitive advantage. Organizations must ensure they are taking the necessary steps to fortify and best protect themselves against current and emerging cyber threats, with a focus on proactive rather than reactive cybersecurity hygiene measures.

It requires a double-pronged approach, a critical shift in mindset regarding the prevalence and severity of a potential cyber-attack, and a pronounced focus of system upgrades to best protect against current and emerging threats.

Assumptions that cyber-attacks are solely targeted at large scale enterprises are no longer valid, with attacks becoming more prevalent, sophisticated, and without discrimination, targeting individuals, small businesses, and complex organizations. This acknowledgement of vulnerability needs to be accompanied by a greater understanding of the importance of regular security upgrades and the crucial part they play in bolstering protection against threats.

Customers should consider that their physical access control system is no different to any of their other business or enterprise systems. In other words, they deploy updates to their IT servers and desktop machines regularly, so their physical security should be no different. In January 2024 there were nearly 30 billion records breached in 4,648 publicly

disclosed security incidents - to put this in context, in December 2023 there were 2.3 billion records breached in 1,352 security incidents, demonstrating a massive uptick in cyber-attacks (Ford, 2024).

The Catastrophic Consequences of Legacy Systems

Software updates are the unsung heroes when it comes to online safety. Yes, they patch annoying bugs and add shiny new features, but their true strength lies in bolstering your digital defenses against ever-evolving threats.

Software updates may be the single best way to protect businesses from cyberattacks. It’s a proactive security measure that reduces the risks for companies to be exposed to cyber-attacks in which cybercriminals target their sensitive data. Responsible software companies have dedicated security teams constantly analyzing attack trends and proactively patching software against potential vulnerabilities. The consequences of leaving legacy hardware and software in place can be catastrophic, ranging from financial losses and data theft to lasting damage to an organization’s reputation. Legacy systems become more vulnerable to attack with each passing day because they lack robust cybersecurity measures to combat modern and escalating threats, often hosting

vulnerabilities that hackers readily exploit. And as regulatory bodies and governments worldwide tighten their grip on data protection and privacy, failure to meet these evolving standards can result in significant legal consequences, including hefty fines.

Continuous Innovation as Gallagher’s Solution

Threats like these inform our cybersecurity efforts here at Gallagher. We hold our products to a higher standard by subjecting them to some of the most rigorous testing in the industry, employing a combination of in-house and third-party penetration testing and collaborating with everyone from standards accrediting bodies to hobbyist hackers to fortify our solutions against the threats of the future. As a result, our solutions meet the cybersecurity needs of both commercial entities and those operating in high security, like government bodies, militaries, and critical infrastructure sites.

Gallagher’s award-winning site management platform, Command Centre, was the first system to offer alarm, access, and perimeter security in one single product, and offer continual enhancements by way of two major releases each year to ensure customers remain at the forefront of innovation.

Upgrading security hardware and software is not merely a matter of keeping up; it’s about staying ahead of the curve. Today’s cybersecurity defense technologies provide proactive measures to significantly enhance a business’s ability to defend itself – and its reputation – against increasingly sophisticated attacks. The defenses supplied by upgraded systems are no longer an option – they’re a necessity and strategic imperative. Cyber threats will continue to evolve and adapt. It’s up to businesses to invest in the protection of their future.

Gallagher will be showcasing their innovative, award-winning suite of security technology at Intersec Saudi Arabia at the Riyadh International Convention & Exhibition Centre from October 1-3. Visit the team at stand #2-D24. For more information visit security.gallagher.com n

HID GLOBAL

THE RISE OF MOBILE ACCESS: TRANSFORMING PHYSICAL SECURITY IN THE DIGITAL AGE

Mobile access control and sustainable cards provide future-proof flexibility for the never-ending endeavors of digital transformation and going green.

Middle East leaders, from policymakers to startup founders, justifiably fret over security. And while we value the integrity of our data – our intellectual property, customer information, and so on – we must also think about our physical security. Many regional organizations are looking, with a fresh eye, at how to manage access to premises and hard assets and are even merging physical and IT access as part of green initiatives.

The Rise of Mobile Access and Digital IDs

To capture a snapshot of physical security HID recently published its State of Physical Access Trend Report after interviewing more than 1,200 enterprise decision-makers from around the world. The study identified five main trends in physical security. One of them is the rising ubiquity of mobile access and digital IDs. To be clear, physical ID cards are still prevalent within the access-control industry, but we see mobile access credentials and digital IDs gaining ground rapidly.

The report revealed that almost two in five (39%) organizations have adopted a mobile-identity solution. Almost half (48%) of the respondents mentioned contact-

less solutions and 44% cited mobile access. These two approaches emerged as the most popular across the access control arena. Arguably, we could say that a revolution is afoot within physical security, likely driven by the continuous arrival of more digital natives in workforces.

Benefits and Future of Mobile Access Solutions

The benefits of such a trend are there for all to see. First, because it has jet-

tisoned physical cards, the adopting enterprise will have drastically reduced its use of plastic, thereby enhancing its sustainability credentials. When mobileaccess solutions integrate digital wallets, the convenience for employees cannot be overstated. Additionally, if a mobile device is lost, it is easier to suspend any credentials they carry and also easier to locate the device, return it to its owner, and reinstate the credentials. And, given our brush with COVID, contactless solutions are better for health and safety.

One estimate from Omdia claims nearly 50 million mobile credentials were downloaded around the globe in 2022. Omdia goes on to predict that the mobile credentials market will expand at a 39.8% CAGR in the five years between 2022 and 2027. HID’s 2024 State of Security and Identity Report showed that security professionals believe almost 80% of organizations worldwide will deploy mobile IDs within the next five years, and industry partners predict this number will be 94%.

This enthusiasm may lie in the fact that investments in mobile identity and contactless systems come not only with the direct benefits mentioned previously, but also with spillover advantages in IT. The employee experience is greatly improved when the same method used to enter the

building can be applied to network authentication. Smartphone and smart watch users can log on to PCs and print documents with the same level of auditability as that associated with physical cards. The industrial applications are just as broad in scope – student ID cards, hotel room keys, and so on.

Moreover, the integration of mobile access with digital wallets enhances both convenience and security. Employees can use their credentials stored in the digital wallets from their smartphones or wearables to access facilities, eliminating the need for physical cards and aligning with digital-first workplace strategies. This shift also supports sustainability by reducing plastic waste. With advanced encryption and the ability to remotely suspend credentials if a device is lost, digital wallets offer a secure and eco-friendly alternative to traditional access methods.

No matter the use case, credentials are never shared or stored on Apple or Google servers, which is a source of significant assurance to end users everywhere. And when end users are happy with a trend, invariably that trend is here to stay. n

GENETEC

GENETEC TO SHOWCASE ADVANCED PHYSICAL SECURITY SOLUTIONS AT MILIPOL QATAR 2024

Cutting-edge security infrastructure plays a key role in building smart, resilient, future-ready urban hubs

n Source: Genetec editorial@asmideast.com

Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, will participate in Milipol Qatar 2024. The company will showcase the latest version of its flagship unified security platform Security Center as well as a range of cloud-ready solutions at the 14th edition of the global exhibition and conference for homeland security and safety.

Engage with Genetec experts

Set to run from October 29 to 31, 2024, at the Doha Exhibition and Convention Center (DECC), the event will see Genetec at the forefront of discussions on how integrated security solutions are supporting Qatar’s technological renaissance. Attendees will have the opportunity to engage with Genetec experts and explore how the company’s cutting-edge offerings are unlocking new opportunities for gov-

ernment and private sector entities across the region.

Exhibiting at Stand C-027, Genetec will also share insights into the latest advancements in hybrid cloud-based security. According to key findings from the 2024 State of Physical Security report, based on a survey of over 5,500 physical security leaders worldwide, most

organizations prefer a hybrid approach that combines on-premises and cloudbased solutions. Close to 60% of end users in the region revealed that their organizations aim for a hybrid security deployment strategy. Meanwhile, 12% of respondents noted that their organizations are currently storing video surveillance data both locally and in the cloud.

We are excited to showcase how our unified security technologies help transform cities into smart, resilient, and future-ready urban hubs in line with the objectives of the Smart Qatar vision

Return to Milipol Qatar

With an ever-growing appetite for embracing the latest technologies, Qatar has emerged as a global innovation hub. From smart cities utilizing Industry 4.0 technologies to AI-driven initiatives, technology is woven into the fabric of daily life. As urbanization in the country booms, there’s an increased need for advanced physical security solutions to safeguard public spaces and critical infrastructure.

“We are excited to return to Milipol Qatar and showcase how our unified security technologies help transform cities into smart, resilient, and future-ready urban hubs in line with the objectives of the Smart Qatar vision,” said Firas Jadalla, Regional Director – Middle East, Turkey, and Africa (META), Genetec Inc. “The event will provide us with an ideal platform to demonstrate our commitment to the country, as evidenced by increased collaboration with local partners.” n

ELEVATING SECURITY SYSTEMS IN THE MIDDLE EAST

TRASSIR AND SUPREMA JOIN FORCES

The integration between TRASSIR and Suprema brings together advanced video surveillance and biometric access control to offer the Middle East market a unified, scalable, and customizable security platform

n Source: Trassir editorial@asmideast.com

In an era of rapidly evolving security threats, businesses and industries across the Middle East face unprecedented challenges. From large-scale retail operations and banking institutions to sprawling industrial complexes and smart cities, the demand for comprehensive, intelligent, and integrated security solutions has never been greater. TRASSIR, a leading company in providing video surveillance solutions, is now elevating its capabilities by integrating Suprema’s advanced biometric and access control technology. This partnership aims to offer the region’s businesses and institutions’ market sophisticated and adaptable security.

A New Era of Unified Security Solutions

TRASSIR’s collaboration with Suprema marks a great step in reshaping the security landscape in the Middle East. The integration between TRASSIR’s Video Management System (VMS) and Suprema’s biometric access control solutions delivers a unified security platform that is both scalable and customizable. By merging Suprema’s top-tier biometrics and access control technologies with TRASSIR’s AI-driven video analytics, this partnership provides a seamless approach to security management. The combined system allows for real-time synchronization between access control events and surveillance footage. This means any access event, such as an unauthorized entry attempt, is automatically linked with

corresponding video footage, making it easier to monitor and respond to potential threats. Whether it’s safeguarding retail stores, manufacturing sites, government facilities, or educational institutions, TRASSIR’s integrated solutions are designed to meet the specific demands of each industry.

Why TRASSIR is the Go-To Choice for VMS Integration

Founded in 2002, TRASSIR has spent over two decades refining its expertise in video surveillance and security solutions, particularly in AI-based video analytics. With offices spanning the UAE, Turkey, India, and Russia, TRASSIR’s products are globally recognized for their innovation, reliability, and scalability. The company’s core philosophy centers on providing future-proof security solutions that not only protect but also evolve alongside emerging technologies and threats.

Suprema, ranked among the top 50 security manufacturers worldwide, is a market leader in biometrics and access control across the EMEA region. Suprema’s BioStar 2 platform, widely used in sectors such as banking, government, healthcare, and infrastructure, is now fully integrated with TRASSIR’s VMS, enabling seamless communication between the two systems.

Key Features of TRASSIR and Suprema Integration

The TRASSIR and Suprema integration offers a range of features that simplify security management, making it more efficient and responsive.

One of the standout features is the real-time event synchronization, where TRASSIR captures authentication events from Suprema devices, logs them, and links them with corresponding video footage from connected

cameras. Additionally, comprehensive event information—such as the type of authentication, date, and time—is logged in TRASSIR’s Event Log for easy access and review. Another key feature is access control video linking, which automatically associates terminal events from Suprema with the video footage from TRASSIR’s connected cameras.

Upcoming Enhancements

Looking ahead, the partnership will soon introduce several enhancements that promise to streamline security management even further. The integration will provide more detailed event information, including the individual’s data and access point, facilitating easier activity tracking. Security personnel will gain the ability to control doors directly through the TRASSIR interface, allowing for more hands-on management. Advanced automation options will enable businesses to create intricate security scenarios with custom scripts. The system will also allow for the capture and saving of event screenshots for enhanced documentation, and integrated alarm monitoring will offer more robust security operations overall.

Designed for the Middle East Market

TRASSIR’s solutions are designed with the specific needs of the Middle East market in mind, particularly in countries like Saudi Arabia, the UAE, and Morocco. This region’s unique blend of rapid urbanization, smart city initiatives, and large-scale infrastructure projects requires security solutions that are both adaptable and scalable. The TRASSIR and Suprema partnership addresses these needs by offering highly customizable solutions that can be tailored to various industries, from retail to government projects. For example, if an unauthorized person attempts to access a restricted area, the TRASSIR system can automatically trigger

alarms, record video, send notifications, and even activate physical security devices such as locks or barriers. The integration of Suprema’s biometric data allows for more secure authentication, ensuring that only authorized personnel have access to sensitive areas. This approach is crucial for industries like banking and healthcare, where the security of sensitive data and assets is paramount.

Unified Security Management: A Game-Changer

One of the standout features of the TRASSIR and Suprema integration is the creation of a unified operations center. This allows security teams to manage access control, monitor video footage, and automate responses all from a single platform. Suprema’s advanced biometrics, combined with TRASSIR’s intuitive VMS, make it easier for businesses to create secure environments without the need for multiple disconnected systems. Suprema’s open REST APIs provide unmatched flexibility, enabling TRASSIR clients to customize their security infrastructure to their exact needs. Whether it’s linking access control events with video surveillance, automating responses through TRASSIR’s scripting engine, or creating complex security workflows, the integration offers limitless possibilities for enhancing security operations.

Automation and Customization: The Future of Security

With a growing emphasis on automation, TRASSIR is taking security management to the next level. Customers can automate specific actions based on triggers, such as sending emails with video clips or adjusting server settings when certain events occur. This ability to create custom security workflows not only enhances operational efficiency but also ensures that businesses can respond to security threats more effectively.

TRASSIR’s solutions are designed with the specific needs of the Middle East market in mind, particularly in countries like Saudi Arabia, the UAE, and Morocco

Furthermore, TRASSIR’s solutions are future-proof, incorporating modern technologies like AI, machine learning, and advanced analytics. These advancements allow for real-time threat detection and response, ensuring that security systems are always one step ahead of potential risks.

Unlocking the Full Potential of Security Systems

The TRASSIR and Suprema partnership is more than just a technological integration— it represents a new standard in security management. By combining TRASSIR’s video surveillance expertise with Suprema’s biometric access control, businesses across the Middle East can enjoy a fully integrated security experience. If you’re looking to elevate your security system, now is the time to explore the power of TRASSIR’s integrated solutions. Discover how TRASSIR can help you unlock smarter automation, tighter access control, and enhanced video management—all in one powerful platform. Contact our team today to learn more or schedule a live demo.

Conclusion

As businesses in the Middle East continue to evolve, so do their security needs. The TRASSIR and Suprema integration offers a blend of innovation, reliability, and customization, ensuring that businesses across the region have access to the best-in-class security solutions. With this partnership, TRASSIR is poised to become the go-to provider for integrated security systems, offering unmatched scalability, automation, and real-time intelligence. n

ASSA ABLOY

APERIO: ASSA ABLOY ADVANCED WIRELESS LOCKING TECHNOLOGY

Aperio, part of ASSA ABLOY’s Digital Access Solutions, offers a scalable and eco-friendly wireless locking technology that seamlessly integrates doors into electronic access control systems, providing enhanced security without the need for extensive wiring

Aperio, part of ASSA ABLOY’s Digital Access Solutions, is an advanced wireless locking technology designed to digitalize and future-proof buildings, making it easy to integrate more doors into electronic access control systems without wiring. This innovative solution bridges the gap between mechanical and digital security, offering a flexible, reliable, and scalable access control solution.

Wireless Integration as a key feature

Aperio devices are built to integrate seamlessly with existing access control systems. The technology allows facility managers to extend security coverage

by wirelessly connecting more doors, saving time and reducing costs associated with hardwiring. The Aperio communication hub connects up to 64 doors within a 25-meter range, offering real-time communication and door status monitoring.

Security and Flexibility

Aperio provides both online and offline integration, enabling real-time door monitoring or access management through stored credentials on access cards. This hybrid model ensures maximum flexibility, allowing organizations to adapt to changing security needs. The locks support multiple RFID and mobile credentials (NFC/BLE), ensuring compatibility with various security systems.

Broad Device Range

Aperio provides a broad selection of wireless devices tailored to various security needs. The L100 Wireless Lock is a comprehensive solution featuring integrated RFID technology and mobile credentials. For medium-security doors, the E100 Wireless Escutcheon offers easy installation and high user convenience. The H100 Wireless Handle boasts a sleek design, en-

abling secure access to internal doors without the need for drilling.

The C100 Wireless Cylinder is both versatile and effective, particularly for securing cabinets and glass doors. Additionally, the P100 Wireless Padlock is ideal for safeguarding non-standard openings, such as storage containers and toolboxes.

Enhanced User Experience

Aperio offers various customization options and functionalities, such as multi-

authentication (PINpad and reader), realtime remote opening, and tamper detection, providing a higher level of security and control. Up to 1,000 users can be granted access even during a temporary system breakdown, ensuring operational continuity.

Eco-friendly and Cost-effective

By reducing the need for extensive wiring and offering long battery life (up to 50 months for most devices), Aperio technology supports green

building initiatives and lowers operational costs.

Aperio in Action: High-Security and Versatility

The Aperio L100 Wireless Lock, a standout in the product line, is equipped with advanced sensors for door and bolt position, tamper detection, and mechanical key override. The L100 can be integrated with a wide range of access systems via AADP or Wiegand hubs, making it a highly versatile solution for demanding environments.

For organizations that require additional security, the **E100 Premium Wireless Escutcheon** offers multiauthentication capabilities, including PIN and RFID, enhancing both user experience and security. These devices ensure seamless integration, providing real-time control while remaining userfriendly and adaptable to various security protocols.

Aperio’s wireless access control solutions represent a significant step towards digitalizing security infrastructure. With its scalable, flexible, and eco-friendly approach, Aperio provides businesses with the tools to enhance security without the burden of rewiring, making it a future-proof solution for modern facilities. Whether used for high-traffic areas, non-standard openings, or sensitive data storage, Aperio ensures robust protection and user convenience. n

Key Security Events in 2024/2025

Regional Cybersecurity Week 2024 27-30 October, 2024, Muscat, Oman

https://rcssummit.com

ICCC 2024 4-6 November 2024, Doha, Qatar

https://iccconference.org

Key Security Events in 2023

Milipol Qatar 29-31 October 2024, Doha, Qatar

https://www.milipolqatar.com/en

ANTICIPATE LONDON

2-4 December 2024, London, UK

https://www.anticipate-event.com/london/ en/home.html

Intersec Police Summit 14-16 January 2025, Dubai, UAE

https://intersec.ae.messefrankfurt.com/dubai/ en/programme-events/intersec-police-summit.html

Integrated Systems Europe 4-7 Feb 2025, Barcelona, Spain

https://www.iseurope.org

Intersec Dubai 14-16 January 2025, Dubai, UAE

https://intersec.ae.messefrankfurt.com/ dubai/en.html

World Police Summit 13-15 Maj 2025, Dubai, UAE

https://www.worldpolicesummit.com

TECHNICAL PROTECTION

Vendor-neutral Physical Security Information Management (PSIM) Bosch

Advancis Middle East

P.O. Box 73309

Abu Dhabi, United Arab Emirates

Tel. +971 2 444 2503

Email: info@advancis.ae Web: https://advancis.net

www.assaabloy.com/ae/en patricia.lomboy@assaabloy.com

Magazine Topics

Man Guarding

Technical protection

• Video surveillance

• Access control

• Intrusion detection

• Item theft protection

• IP and network solutions

• Perimeter protection

• Fire detection

• Gas detection

Mechanical protection Cash/valuables-in-transit

Cyber security

Digital forensics

Software solutions

Smart home

Internet of things

Security management Investigations

Building management

Market research

Legislation and standards

m.shenawy@supremainc.com)

Tel: +971 4 2357 996 www.supremainc.com

LOCKING

Tel.: +34 943 344 550 Email: hospitality@saltosystems.com www.saltohospitality.com

Index of Advertisers

Magazine Topics

Man Guarding

Technical

Smart

Internet

Building

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.